Sciweavers

450 search results - page 80 / 90
» Robust Topology Control Protocols
Sort
View
NDSS
2003
IEEE
15 years 5 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
83
Voted
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
15 years 4 months ago
Trust Estimation in autonomic networks: a statistical mechanics approach
— Trust management, broadly intended as the ability to maintain belief relationship among entities, is recognized as a fundamental security challenge for autonomous and selforgan...
Stefano Ermon, Luca Schenato, Sandro Zampieri
DIM
2005
ACM
15 years 1 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
RTSS
2005
IEEE
15 years 5 months ago
Gradient-Ascending Routing via Footprints in Wireless Sensor Networks
A novel gradient-ascending stateless routing protocol, called GRASP (GRadient Ascending Stateless Protocol), is proposed for stationary wireless sensor networks. GRASP is built wi...
Jai-Jin Lim, Kang G. Shin
SCN
2010
Springer
138views Communications» more  SCN 2010»
14 years 10 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov