Sciweavers

24529 search results - page 263 / 4906
» Computing on Authenticated Data
Sort
View
123
Voted
CCR
2007
115views more  CCR 2007»
15 years 3 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
126
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
15 years 3 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
157
Voted
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 2 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
129
Voted
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 29 days ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
70
Voted
COMPUTER
2002
47views more  COMPUTER 2002»
15 years 3 months ago
Using Coplink to Analyze Criminal-Justice Data
Roslin V. Hauck, Homa Atabakhsh, Pichai Ongvasith,...