Sciweavers

1612 search results - page 295 / 323
» About models of security protocols
Sort
View
NETWORKING
2008
14 years 11 months ago
On the Applicability of Knowledge Based NAT-Traversal for Home Networks
The presence of Network Address Translation (NAT) is a hindrance when accessing services within home networks, because NAT breaks the end-to-end connectivity model of the Internet ...
Andreas Müller, Andreas Klenk, Georg Carle
KAIS
2008
151views more  KAIS 2008»
14 years 9 months ago
Expertise-based peer selection in Peer-to-Peer networks
Abstract. Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining th...
Peter Haase, Ronny Siebes, Frank van Harmelen
PET
2010
Springer
15 years 1 months ago
unFriendly: Multi-party Privacy Risks in Social Networks
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...
Kurt Thomas, Chris Grier, David M. Nicol
ACNS
2006
Springer
78views Cryptology» more  ACNS 2006»
15 years 3 months ago
DSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the hig...
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Bl...
IPPS
2005
IEEE
15 years 3 months ago
MOCCA - Towards a Distributed CCA Framework for Metacomputing
— We describe the design and implementation of MOCCA, a distributed CCA framework implemented using the H2O metacomputing system. Motivated by the quest for appropriate metasyste...
Maciej Malawski, Dawid Kurzyniec, Vaidy S. Sundera...