Sciweavers

234 search results - page 19 / 47
» Text Search Protocols with Simulation Based Security
Sort
View
CORR
2010
Springer
99views Education» more  CORR 2010»
14 years 9 months ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...
CROSSROADS
2004
108views more  CROSSROADS 2004»
14 years 9 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
15 years 3 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
EDBT
2006
ACM
181views Database» more  EDBT 2006»
15 years 9 months ago
TeNDaX, a Collaborative Database-Based Real-Time Editor System
TeNDaX is a collaborative database-based real-time editor system. TeNDaX is a new approach for word-processing in which documents (i.e. content and structure, tables, images etc.) ...
Klaus R. Dittrich, Michael H. Böhlen, Stefani...
FORTE
2003
14 years 11 months ago
A Lightweight Formal Analysis of a Multicast Key Management Scheme
Abstract. This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure...
Mana Taghdiri, Daniel Jackson