Sciweavers

194 search results - page 31 / 39
» A Protection Scheme for Collaborative Environments
Sort
View
INFOCOM
1999
IEEE
15 years 1 months ago
MTCP: Scalable TCP-like Congestion Control for Reliable Multicast
We present MTCP, a congestion control scheme for large-scale reliable multicast. Congestion control for reliable multicast is important, because of its wide applications in multim...
Injong Rhee, Nallathambi Balaguru, George N. Rousk...
89
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
SWS
2006
ACM
15 years 3 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
CCS
2010
ACM
14 years 9 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...

Publication
145views
14 years 5 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...