Parcourir par auteur "Sundaram, G. S."
Voici les éléments 1-3 de 3
-
Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks
Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. ... -
Group Authentication: A New Paradigm for Emerging Applications
Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)Traditional secure registration protocols rely on client-server authentication procedures. This concept has been extended to support single client registration to multiple servers, using single sign-on protocols. In this ... -
Secure Enablement of Real Time Applications: A Novel End-to-End Approach
Cakulev, V.; Broustis, I.; Sundaram, G. S. (2012)The Internet has evolved into a multi-service Internet Protocol (IP) network with support for various types of traffic, including multimedia. Given the relatively open nature of IP networks, securely enabling multimedia ...