Sciweavers

1853 search results - page 348 / 371
» Cryptographic Protocols and Network Security
Sort
View
69
Voted
FC
2010
Springer
191views Cryptology» more  FC 2010»
15 years 1 months ago
Using Sphinx to Improve Onion Routing Circuit Construction
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit constru...
Aniket Kate, Ian Goldberg
IADIS
2004
14 years 11 months ago
The efficient communications for VPN access of mobile nodes over mobile IPV6
Mobile IPv6 is thought to be dominant protocol for providing mobility. In the near future, most portable communication devices will deploy Mobile IPv6 mechanism. Our main concerns...
Hyungkyu Lee, Jaehoon Nah, Kyoil Jung
OSDI
2000
ACM
14 years 10 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
COMCOM
2002
189views more  COMCOM 2002»
14 years 9 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
SIGCOMM
2004
ACM
15 years 2 months ago
The design and implementation of a next generation name service for the internet
Name services are critical for mapping logical resource names to physical resources in large-scale distributed systems. The Domain Name System (DNS) used on the Internet, however,...
Venugopalan Ramasubramanian, Emin Gün Sirer