Sciweavers

2904 search results - page 158 / 581
» Internet Infrastructure Security
Sort
View
IJNSEC
2008
146views more  IJNSEC 2008»
15 years 3 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
142
Voted
DSN
2009
IEEE
15 years 1 months ago
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds
Distributed intelligence and secure interconnected communication networks constitute recognized key factors for the economic operation of electricity infrastructures in competitiv...
Giovanna Dondossola, Fabrizio Garrone, Judit Szant...
133
Voted
OSDI
2004
ACM
16 years 4 months ago
Improving the Reliability of Internet Paths with One-hop Source Routing
Recent work has focused on increasing availability in the face of Internet path failures. To date, proposed solutions have relied on complex routing and pathmonitoring schemes, tr...
P. Krishna Gummadi, Harsha V. Madhyastha, Steven D...
SIGCOMM
2006
ACM
15 years 9 months ago
MIRO: multi-path interdomain routing
The Internet consists of thousands of independent domains with different, and sometimes competing, business interests. However, the current interdomain routing protocol (BGP) limi...
Wen Xu, Jennifer Rexford
COMCOM
2006
121views more  COMCOM 2006»
15 years 3 months ago
Load-balanced agent activation for value-added network services
In relation to its growth in size and user population, the Internet faces new challenges that have triggered the proposals of value-added network services, e.g., IP multicast, IP ...
Chao Gong, Kamil Saraç, Ovidiu Daescu, Bala...