Sciweavers

96 search results - page 18 / 20
» A novel three-party encrypted key exchange protocol
Sort
View
LCN
2005
IEEE
15 years 3 months ago
Automated Traffic Classification and Application Identification using Machine Learning
The dynamic classification and identification of network applications responsible for network traffic flows offers substantial benefits to a number of key areas in IP network engi...
Sebastian Zander, Thuy T. T. Nguyen, Grenville J. ...
CCS
2006
ACM
15 years 1 months ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao
CN
2007
96views more  CN 2007»
14 years 9 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang
77
Voted
PET
2007
Springer
15 years 3 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
INFOCOM
2009
IEEE
15 years 4 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu