Sciweavers

4305 search results - page 211 / 861
» Analysing Protocol Implementations
Sort
View
ICCCN
2007
IEEE
14 years 3 months ago
SCUBE: A DoS-Resistant Distributed Search Protocol
– Many P2P-based storage systems use distributed indexing service for searching documents. There are two security issues when the nodes providing the index service are compromise...
Souvik Ray, Zhao Zhang
IEEEARES
2006
IEEE
14 years 3 months ago
Secure Enhanced Wireless Transfer Protocol
When IEEE 802.11i draft[1] proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage se...
Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang
ICALP
2005
Springer
14 years 2 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
IFIP
2004
Springer
14 years 2 months ago
Efficient Protocols for Computing the Optimal Swap Edges of a Shortest Path Tree
We consider the problem of computing the optimal swap edges of a shortest-path tree. This theoretical problem arises in practice in systems that offer point-offailure shortest-path...
Paola Flocchini, Antonio Mesa Enriques, Linda Pagl...
ICDCSW
2003
IEEE
14 years 2 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...