Sciweavers

1853 search results - page 331 / 371
» Cryptographic Protocols and Network Security
Sort
View
CCS
2009
ACM
16 years 2 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
112
Voted
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 8 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
LCN
2006
IEEE
15 years 8 months ago
Privacy-Preserving Quick Authentication in Fast Roaming Networks
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang
106
Voted
WPES
2003
ACM
15 years 7 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
DIM
2006
ACM
15 years 7 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...