Sciweavers

362 search results - page 25 / 73
» Authenticated Adversarial Routing
Sort
View
AISM
2004
13 years 9 months ago
An Examination of the Security of Routing Protocol Updates
The exchange of routing protocol updates is used to ensure that routers using an Internal Gateway Protocol (IGP) in an Autonomous System (AS), or routers using an External Gateway...
G. Murphy
CORR
2002
Springer
92views Education» more  CORR 2002»
13 years 7 months ago
Source Routing and Scheduling in Packet Networks
We study routing and scheduling in packet-switched networks. We assume an adversary that controls the injection time, source, and destination for each packet injected. A set of pat...
Matthew Andrews, Antonio Fernández, Ashish ...
DEBS
2010
ACM
13 years 8 months ago
Providing basic security mechanisms in broker-less publish/subscribe systems
The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publi...
Muhammad Adnan Tariq, Boris Koldehofe, Ala' Altawe...
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 2 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
14 years 8 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang