Sciweavers

1342 search results - page 225 / 269
» Attacks are Protocols Too
Sort
View
COMPSAC
2009
IEEE
15 years 8 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...
INFOCOM
2009
IEEE
15 years 8 months ago
Encounter-Based Routing in DTNs
—Current work in routing protocols for delay and disruption tolerant networks leverage epidemic-style algorithms that trade off injecting many copies of messages into the network...
Samuel C. Nelson, Mehedi Bakht, Robin Kravets
GLOBECOM
2008
IEEE
15 years 8 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 8 months ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen
ICDCS
2007
IEEE
15 years 8 months ago
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...