Sciweavers

72
Voted
NDSS
1998
IEEE
15 years 3 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
106
Voted
NDSS
1998
IEEE
15 years 3 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
102
Voted
NDSS
1998
IEEE
15 years 3 months ago
Credential Management and Secure Single Login for SPKM
The GSS-API [20, 21] offers security services independent of underlying mechanisms. A possible GSS-mechanism is the Simple Public Key Mechanism (SPKM) specified in [1]. In this pa...
Detlef Hühnlein
71
Voted
NDSS
1998
IEEE
15 years 3 months ago
Implementing Protection Domains in the JavaTM Development Kit 1.2
Li Gong, Roland Schemers
111
Voted
NDSS
1998
IEEE
15 years 3 months ago
The Multilayer Firewall
We present a new security technology called the Multilayer Firewall. We argue that it is useful in some situations for which other approaches, such as cryptographically protected ...
Dan M. Nessett, Polar Humenn
74
Voted
NDSS
1998
IEEE
15 years 3 months ago
Trust Management and Internet Client Security
Blair Dillaway
88
Voted
NDSS
1998
IEEE
15 years 3 months ago
Attack Detection Methods for All-Optical Networks
This paper focuses on theoretical methods for detecting intentional attacks upon the infrastructure of an all-optical network. Applications of existing methods used in traditional...
Muriel Médard, Douglas Marquis, Stephen R. ...
69
Voted
NDSS
1998
IEEE
15 years 3 months ago
What Will Probably Happen
Dan McDonald
71
Voted
NDSS
1998
IEEE
15 years 3 months ago
An Intermediate System's View of IPSEC
Cheryl Madson