Current ubiquitous computing technologies provide access to customized, contextual, and location-based services. Device mobility, however, is frequently associated with …
J Ott - Proceedings of the 11th International Symposium on …, 2008 - netlab.tkk.fi
The Internet protocols were designed to provide end-to-end connectivity across heterogeneous networks, yet primarily assuming a “fixed” and rather static network …
SSH (secure shell) is a very popular secure communication application. Users can remotely login to servers through SSH channels with security protection. However, since the SSH …
D Ahmat, D Magoni - 2012 IFIP Wireless Days, 2012 - ieeexplore.ieee.org
Mobility and security are very important services for both current and future network infrastructures. However, the integration of mobility in traditional virtual private networks is …
Several solutions have been proposed for Mobility Management in the Internet, ranging from the Network to the Application Layer. Existing support for mobility management is designed …
Host mobility presents a challenge for security protocols. For example, many proposals exist for integrating IPsec to mobile IP. However, the existing approaches are cumbersome to …
Virtual Private Network (VPN) is the traditional approach for an end-to-end secure connection between two endpoints. But conventional VPN solutions are intended for wired …
S Suoranta, J Heikkinen, P Silvekoski - Nordic Conference on Secure IT …, 2010 - Springer
Consumers increasingly access services with different devices such as desktop workstations, notepad computers and mobile phones. When they want to switch to another …
J Ott, P Ylikoski, N Seifert, C Carroll… - … Symposium on a …, 2009 - ieeexplore.ieee.org
The quality of Internet access for mobile users may suffer from highly variable communication characteristics (packet loss, delay, throughput) and from temporary …