Sciweavers

947 search results - page 60 / 190
» Provable Implementations of Security Protocols
Sort
View
ICOIN
2007
Springer
15 years 6 months ago
Balanced Multipath Source Routing
Abstract. We consider the problem of balancing the traffic load ideally over a wireless multihop network. In previous work, a systematic approach to this task was undertaken, start...
Shreyas Prasad, André Schumacher, Harri Haa...
NTMS
2009
IEEE
15 years 6 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
CMS
2003
171views Communications» more  CMS 2003»
15 years 1 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
JSS
2010
111views more  JSS 2010»
14 years 10 months ago
Promoting the development of secure mobile agent applications
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...
JAMIA
2011
68views more  JAMIA 2011»
14 years 2 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...