Sciweavers

5324 search results - page 158 / 1065
» Internet Security Protocols
Sort
View
ENTCS
2007
129views more  ENTCS 2007»
15 years 3 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
ICDCS
2003
IEEE
15 years 9 months ago
Optimal Distribution Tree for Internet Streaming Media
Internet radio and television stations require significant bandwidth to support delivery of high quality audio and video streams to a large number of receivers. IP multicast is a...
Min Sik Kim, Simon S. Lam, Dong-Young Lee
EUC
2005
Springer
15 years 9 months ago
ANTS: An Evolvable Network of Tiny Sensors
As a promising technology that enables ubiquitous computing and leads IT industries of next generation, sensor networks (SN) are foreseen to expand and populate the globe in such a...
Daeyoung Kim, Tomás López, Seongeun ...
136
Voted
ICTAI
1999
IEEE
15 years 8 months ago
Cognitive Packet Networks
Reliability, security, scalability and QoS (Quality-of-Service) have become key issues as we envision the future Internet. This paper presents the "Cognitive Packet Network (C...
Erol Gelenbe, Zhiguang Xu, Esin Seref
127
Voted
COMCOM
2006
75views more  COMCOM 2006»
15 years 4 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin