Sciweavers

356 search results - page 37 / 72
» AUTHMAC_DH: A New Protocol for Authentication and Key Distri...
Sort
View
HPDC
2002
IEEE
14 years 17 days ago
Flexibility, Manageability, and Performance in a Grid Storage Appliance
We present NeST, a flexible software-only storage appliance designed to meet the storage needs of the Grid. NeST has three key features that make it well-suited for deployment in...
John Bent, Venkateshwaran Venkataramani, Nick LeRo...
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
IFIP
2009
Springer
13 years 5 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
ACISP
2005
Springer
14 years 1 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
NSPW
2004
ACM
14 years 1 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley