Sciweavers

5324 search results - page 126 / 1065
» Internet Security Protocols
Sort
View
ESORICS
1994
Springer
15 years 2 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
AIMS
2008
Springer
15 years 4 months ago
N2N: A Layer Two Peer-to-Peer VPN
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by ...
Luca Deri, Richard Andrews
WD
2010
14 years 7 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla
CN
1999
92views more  CN 1999»
14 years 9 months ago
Managing TCP Connections Under Persistent HTTP
Hyper Text Transfer Protocol (HTTP) traffic dominates Internet traffic. The exchange of HTTP messages is implemented
Edith Cohen, Haim Kaplan, Jeffrey D. Oldham
CCS
2008
ACM
14 years 12 months ago
Verified implementations of the information card federated identity-management protocol
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr...