Sciweavers

3751 search results - page 126 / 751
» Events in security protocols
Sort
View
IJNSEC
2008
164views more  IJNSEC 2008»
15 years 4 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau
GLOBECOM
2008
IEEE
15 years 10 months ago
Using the ECN Nonce to Detect Spurious Loss Events in TCP
—A sudden delay spike or reordering in the network can cause TCP to experience a loss event. Since loss is interpreted as a sign of congestion in TCP, this causes the protocol to...
Michael Welzl
PDCAT
2007
Springer
15 years 10 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
SKG
2006
IEEE
15 years 10 months ago
A New Method to Security Electronic Commerce Protocol
We use semi-regular entities to denote the entities different from penetrates that participate in the protocol on behalf of themselves such as customers in e-commerce.
Jie Yang, Hai-guang Mo, Yu-heng Long
NDSS
1997
IEEE
15 years 8 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin