Sciweavers

7329 search results - page 400 / 1466
» Network Extractor Protocols
Sort
View
ICDCS
1997
IEEE
15 years 9 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh
154
Voted
CORR
2006
Springer
114views Education» more  CORR 2006»
15 years 5 months ago
A Byzantine Fault Tolerant Distributed Commit Protocol
In this paper, we present a Byzantine fault tolerant distributed commit protocol for transactions running over untrusted networks. The traditional two-phase commit protocol is enh...
Wenbing Zhao
IJNSEC
2011
116views more  IJNSEC 2011»
15 years 1 days ago
An Authentication Protocol Based on Kerberos 5
We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle’s secretkey will be independent of the user password to overcome the weak...
Eman El-Emam, Magdy Koutb, Hamdy Kelash, Osama S. ...
JCS
2011
126views more  JCS 2011»
15 years 22 hour ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
ANSS
2008
IEEE
15 years 11 months ago
A Primer for Real-Time Simulation of Large-Scale Networks
—Real-time network simulation refers to simulating computer networks in real time so that the virtual network can interact with real implementations of network protocols, network...
Jason Liu