Sciweavers

4263 search results - page 226 / 853
» Network Security
Sort
View
140
Voted
NDSS
1999
IEEE
15 years 9 months ago
A Real-World Analysis of Kerberos Password Security
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...
Thomas D. Wu
MOBIQUITOUS
2007
IEEE
15 years 11 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
106
Voted
DSN
2004
IEEE
15 years 9 months ago
Support for Mobility and Fault Tolerance in Mykil
This paper describes the support provided for mobility and fault tolerance in Mykil, which is a key distribution protocol for large, secure group multicast. Mykil is based on a com...
Jyh-How Huang, Shivakant Mishra
161
Voted
NDSS
2000
IEEE
15 years 9 months ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...
CCS
2010
ACM
16 years 5 days ago
Region-based BGP announcement filtering for improved BGP security
BGP prefix hijacking is a serious security threat on the Internet. In this paper we propose a region-based BGP announcement filtering scheme (RBF) to improve the BGP security. I...
Fernando Sanchez, Zhenhai Duan