Sciweavers

517 search results - page 19 / 104
» Distributed Authentication in GRID5000
Sort
View
IPPS
2007
IEEE
15 years 4 months ago
ESSTCP: Enhanced Spread-Spectrum TCP
Having stealth and lightweight authentication methods is empowering network administrators to shelter critical services from adversaries. Spread-Spectrum TCP (SSTCP) [1] is one of...
Amir R. Khakpour, Hakima Chaouchi
FTDCS
2003
IEEE
15 years 3 months ago
Adopting Redundancy Techniques for Multicast Stream Authentication
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Fe...
JDCTA
2010
125views more  JDCTA 2010»
14 years 4 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
IPPS
2005
IEEE
15 years 3 months ago
Security Enhancement in InfiniBand Architecture
The InfiniBandTM Architecture (IBA) is a new promising I/O communication standard positioned for building clusters and System Area Networks (SANs). However, the IBA specification ...
Manhee Lee, Eun Jung Kim, Mazin S. Yousif
MIDDLEWARE
2005
Springer
15 years 3 months ago
A new two-message authentication protocol for RFID sensor networks
Ê Ó Ö ÕÙ Ò Ý Á ÒØ Ø ÓÒ ´Ê Á µ Ø ÒÓÐÓ Ý × Ñ ¹ Ø Ó ØÓ Ö ÑÓØ ÐÝ ×ØÓÖ Ò Ö ØÖ Ú Ø Ù× Ò ×Ñ ÐÐ Ñ ¹ ÖÓ Ô ÐÐ Ø Ê Á Ø ...
Selma Boumerdassi, Papa Kane Diop, Éric Ren...