Sciweavers

479 search results - page 53 / 96
» cn 2008
Sort
View
CN
2006
117views more  CN 2006»
14 years 10 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
CN
2006
58views more  CN 2006»
14 years 10 months ago
Dynamically extending the Corral with native code for high-speed packet processing
By combining the Open Kernel Environment, a Click-like software model known as Corral and basic concepts of active networking, we allow third-party code to control the code organi...
Herbert Bos, Bart Samwel, Ilja Booij
CN
2006
124views more  CN 2006»
14 years 10 months ago
Packet classification using diagonal-based tuple space search
Multidimensional packet classification has attracted considerable research interests in the past few years due to the increasing demand on policy based packet forwarding and secur...
Fu-Yuan Lee, Shiuh-Pyng Shieh
CN
2006
85views more  CN 2006»
14 years 10 months ago
An efficient heuristic for selecting active nodes in wireless sensor networks
Energy saving is a paramount concern in wireless sensor networks (WSNs). A strategy for energy saving is to cleverly manage the duty cycle of sensors, by dynamically activating di...
Flávia Coimbra Delicato, Fábio Prott...
CN
2006
66views more  CN 2006»
14 years 10 months ago
Secure acknowledgment aggregation and multisignatures with limited robustness
In certain reliable group-oriented and multicast applications, a source needs to securely verify whether all (and if not all, which) intended receivers have received a message. How...
Claude Castelluccia, Stanislaw Jarecki, Jihye Kim,...