Sciweavers

712 search results - page 42 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
TRUST
2009
Springer
15 years 4 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
WWW
2003
ACM
15 years 10 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
NDSS
1998
IEEE
15 years 1 months ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just
ICUMT
2009
14 years 7 months ago
Multipath at the transport layer: An end-to-end resilience mechanism
Abstract--As society's dependence on network technology increases, the need for resilience and survivability in these services becomes increasingly apparent. Since the user ex...
Justin P. Rohrer, Ramya Naidu, James P. G. Sterben...
WISEC
2009
ACM
15 years 4 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...