Sciweavers

1612 search results - page 227 / 323
» About models of security protocols
Sort
View
ICCCN
2008
IEEE
15 years 4 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ASIACRYPT
2009
Springer
15 years 4 months ago
Signature Schemes with Bounded Leakage Resilience
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (or possibly other internal state information) is leaked to an adv...
Jonathan Katz, Vinod Vaikuntanathan
ICISS
2005
Springer
15 years 3 months ago
VTrust: A Trust Management System Based on a Vector Model of Trust
Abstract. Trust can be used to measure our confidence that a secure system behaves as expected. We had previously proposed a vector model of trust [1]. In this work we address the...
Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
GLOBECOM
2009
IEEE
15 years 1 months ago
Power Efficient Traffic Grooming in Optical WDM Networks
Abstract--Power-awareness in networking attracts more attention as the trends in the energy consumption of the Internet raise growing concerns about the environmental impacts and s...
Emre Yetginer, George N. Rouskas
AGENTS
1997
Springer
15 years 2 months ago
Integrating Communicative Action, Conversations and Decision Theory to Coordinate Agents
The coordination problem in multi-agent systems is the problem of managing dependencies between the activities of autonomous agents, in conditions of incomplete knowledge about th...
Mihai Barbuceanu, Mark S. Fox