Sciweavers

4 search results - page 1 / 1
» Pretty Good Packet Authentication
Sort
View
HOTDEP
2008
114views Hardware» more  HOTDEP 2008»
13 years 8 months ago
Pretty Good Packet Authentication
Internet addresses are routinely being used to infer the identity of persons who send offending traffic
Andreas Haeberlen, Rodrigo Rodrigues, P. Krishna G...
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
13 years 11 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
HOTI
2002
IEEE
13 years 10 months ago
Stable Round-Robin Scheduling Algorithms for High-Performance Input Queued Switches
High-performance input-queued switches require highspeed scheduling algorithms while maintaining good performance. Various round-robin scheduling algorithms for Virtual Output Que...
Jing Liu, Chun Kit Hung, Mounir Hamdi, Chi-Ying Ts...
IPL
2007
72views more  IPL 2007»
13 years 5 months ago
How to safely close a discussion
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...
Gildas Avoine, Serge Vaudenay