Sciweavers

1612 search results - page 157 / 323
» About models of security protocols
Sort
View
ICN
2007
Springer
15 years 10 months ago
ABW - Short-Timescale Passive Bandwidth Monitoring
ct Bandwidth usage monitoring is important for network troubleshooting and planning. Traditionally, used bandwidth is computed from router interface byte counters read by SNMP. Thi...
Sven Ubik, Demetres Antoniades, Arne Øsleb&...
IPPS
2007
IEEE
15 years 10 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 10 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
DAM
2008
103views more  DAM 2008»
15 years 4 months ago
Counting preimages of TCP reordering patterns
Packet reordering is an important property of network traffic that should be captured by analytical models of the Transmission Control Protocol (TCP). We study a combinatorial pro...
Anders Hansson, Gabriel Istrate
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
15 years 10 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud