Sciweavers

5324 search results - page 92 / 1065
» Internet Security Protocols
Sort
View
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 1 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
OTM
2005
Springer
15 years 3 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...
ASIACRYPT
2001
Springer
15 years 1 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
WWW
2006
ACM
15 years 10 months ago
SCTP: an innovative transport layer protocol for the web
Preethi Natarajan, Janardhan R. Iyengar, Paul D. A...
SAINT
2003
IEEE
15 years 3 months ago
Multihoming Support based on Mobile Node Protocol LIN6
Arifumi Matsumoto, Kenji Fujikawa, Yasuo Okabe, Fu...