Sciweavers

1630 search results - page 206 / 326
» Secure Overlay Network Design
Sort
View
CCR
2008
170views more  CCR 2008»
15 years 3 months ago
Probe-Aided MulTCP: an aggregate congestion control mechanism
An aggregate congestion control mechanism, namely ProbeAided MulTCP (PA-MulTCP), is proposed in this paper. It is based on MulTCP, a proposal for enabling an aggregate to emulate ...
Fang-Chun Kuo, Xiaoming Fu
WISEC
2010
ACM
15 years 10 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
WISEC
2010
ACM
15 years 10 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 6 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
INTERACT
2003
15 years 4 months ago
Managing Multiple Passwords and Multiple Logins: MiFA
Internet users today who subscribe to many different accounts or subscriptions online face a bewildering array of logins and passwords to remember on security systems where usabil...
Bo Lu, Michael Twidale