Sciweavers

28 search results - page 3 / 6
» Internet Voting Protocol Based on Improved Implicit Security
Sort
View
ISADS
1999
IEEE
13 years 10 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
CORR
2008
Springer
135views Education» more  CORR 2008»
13 years 6 months ago
A DCCP Congestion Control Mechanism for Wired- cum-Wireless Environments
Existing transport protocols, be it TCP, SCTP or DCCP, do not provide an efficient congestion control mechanism for heterogeneous wired-cum-wireless networks. Solutions involving i...
Ijaz Haider Naqvi, Tanguy Pérennou
CMS
2003
171views Communications» more  CMS 2003»
13 years 7 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
PAISI
2007
Springer
14 years 11 days ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
WS
2004
ACM
13 years 11 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...