Sciweavers

40 search results - page 7 / 8
» A protocol for property-based attestation
Sort
View
ATC
2007
Springer
13 years 11 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
ESOP
2003
Springer
13 years 10 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
SIGCOMM
2004
ACM
13 years 10 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
13 years 9 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
SIGCOMM
1999
ACM
13 years 9 months ago
On Estimating End-to-End Network Path Properties
The more information about current network conditions available to a transport protocol, the more efficiently it can use the network to transfer its data. In networks such as the...
Mark Allman, Vern Paxson