Sciweavers

2562 search results - page 220 / 513
» An Internet without the Internet protocol
Sort
View
NDSS
2002
IEEE
15 years 9 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
INFOCOM
1998
IEEE
15 years 8 months ago
Timer Reconsideration for Enhanced RTP Scalability
RTP, the Real Time Transport Protocol, has gained widespread acceptance as the transport protocol for voice and video on the Internet. Its companion control protocol, the Real Tim...
Jonathan Rosenberg, Henning Schulzrinne
CCS
2006
ACM
15 years 7 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
CCS
2008
ACM
15 years 6 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
124
Voted
ISCAPDCS
2001
15 years 5 months ago
Comparison of Various TCP Implementations in a Congested Network
Transmission Control Protocol (TCP) in the Internet Protocol suite has become over the years the most widely used protocol for data communications. Recent developments in high-spe...
Mansoor Alam, Shravan K. Vallala, Min Song