Sciweavers

1272 search results - page 189 / 255
» Blocking in All-Optical Networks
Sort
View
NDSS
2005
IEEE
15 years 9 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
ESAS
2005
Springer
15 years 9 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...
128
Voted
IPTPS
2005
Springer
15 years 9 months ago
Peering Peer-to-Peer Providers
The early peer-to-peer applications eschewed commercial arrangements and instead established a grass-roots model in which the collection of end-users provided their own distribute...
Hari Balakrishnan, Scott Shenker, Michael Walfish
INDOCRYPT
2004
Springer
15 years 9 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
IWQOS
2004
Springer
15 years 9 months ago
Enhancing mobile QoS based on movement contracts
Abstract— Resource management for individual flows can significantly improve quality of service (QoS) in mobile cellular networks. However, its efficiency depends on the avail...
Frank A. Zdarsky, Jens B. Schmitt