Sciweavers

1490 search results - page 188 / 298
» The Logic of Authentication Protocols
Sort
View
INFOCOM
2010
IEEE
14 years 11 months ago
Channel-based Unidirectional Stream Protocol (CUSP)
—This paper presents a novel transport protocol, CUSP, specifically designed with complex and dynamic network applications in mind. Peer-to-peer applications benefit in particu...
Wesley W. Terpstra, Christof Leng, Max Lehn, Aleja...
NDSS
2007
IEEE
15 years 6 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
DCOSS
2008
Springer
15 years 2 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
MDM
2004
Springer
15 years 6 months ago
Multi-Protocol Profiles to Support User Mobility Across Network Technologies
Seamless roaming in heterogeneous circuit-switched and IP networks is key for successful migration towards all-IP. The Unified Mobility Manager (UMM) keeps track of users’ locat...
Oliver Haase, Ming Xiong, Kazutaka Murakami
116
Voted
ICPPW
2003
IEEE
15 years 5 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao