Sciweavers

1251 search results - page 214 / 251
» On the security of group communication schemes
Sort
View
119
Voted
MMB
2004
Springer
15 years 7 months ago
SREM: A Novel Multicast Routing Algorithm - Comprehensive Cost Analysis
Ever-increasing attention has been drawn to source specific multicast in the Internet society. In this paper, a novel multicast scheme, called Scalable Recursive Explicit Multicast...
Yewen Cao, Khalid Al-Begain
104
Voted
GLOBECOM
2007
IEEE
15 years 8 months ago
Performance of Lincoded Optical Heterodyne CPFSK Transmission System Affected by Polarization Mode Dispersion in a Single Mode F
A theoretical analysis for evaluating the performance of a lincoded continuous phase optical frequency shift keying (CPFSK) optical transmission system with delay line demodulation...
Md. Saiful Islam 0002, Satya Prasad Majumder
MOBISEC
2009
Springer
15 years 8 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
134
Voted
CCS
2007
ACM
15 years 8 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
CCS
2008
ACM
15 years 3 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...