Sciweavers

947 search results - page 131 / 190
» Provable Implementations of Security Protocols
Sort
View
119
Voted
SIGCOMM
2010
ACM
15 years 25 days ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia
94
Voted
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 1 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
94
Voted
LISA
2003
15 years 2 months ago
EasyVPN: IPsec Remote Access Made Easy
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
Mark C. Benvenuto, Angelos D. Keromytis
133
Voted
JIPS
2007
223views more  JIPS 2007»
15 years 15 days ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
115
Voted
TRUST
2009
Springer
15 years 7 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi