Sciweavers

2904 search results - page 163 / 581
» Internet Infrastructure Security
Sort
View
100
Voted
CCR
2002
92views more  CCR 2002»
15 years 3 months ago
Controlling high bandwidth aggregates in the network
The current Internet infrastructure has very few built-in protection mechanisms and is therefore vulnerable to attacks and failures. In particular, recent events have illustrated ...
Ratul Mahajan, Steven M. Bellovin, Sally Floyd, Jo...
SAC
2005
ACM
15 years 9 months ago
Scalable security and accounting services for content-based publish/subscribe systems
Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large scale dynamic applications. However, widespread use of these systems...
Himanshu Khurana
130
Voted
AINA
2009
IEEE
15 years 8 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
123
Voted
IM
2003
15 years 5 months ago
Multiple Authorization - A Model and Architecture for Increased, Practical Security
: Security of systems and management infrastructure is crucial for a successful, reliable and safe use. Most currently deployed systems are based on simple subject/object-relations...
Gerald Vogt
143
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long