Sciweavers

221 search results - page 26 / 45
» Design and Implementation of a Real-Time ATM-Based Protocol ...
Sort
View
WWW
2009
ACM
14 years 9 months ago
PAKE-based mutual HTTP authentication for preventing phishing attacks
We developed a new Web authentication protocol with passwordbased mutual authentication which prevents various kinds of phishing attacks. This protocol provides a protection of us...
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hi...
SCN
2008
Springer
131views Communications» more  SCN 2008»
13 years 8 months ago
CLL: A Cryptographic Link Layer for Local Area Networks
Abstract. Ethernet and IP form the basis of the vast majority of LAN installations. But these protocols do not provide comprehensive security mechanisms, and thus give way for a pl...
Yves Igor Jerschow, Christian Lochert, Björn ...
MSS
2005
IEEE
133views Hardware» more  MSS 2005»
14 years 2 months ago
Exporting Storage Systems in a Scalable Manner with pNFS
To meet enterprise and grand challenge-scale performance and interoperability requirements, a group of engineers—initially ad-hoc but now integrated into the IETF—is designing...
Dean Hildebrand, Peter Honeyman
USENIX
2001
13 years 10 months ago
The X Resize and Rotate Extension - RandR
The X Window System protocol, Version 11, was deliberately designed to be extensible, to provide for both anticipated and unanticipated needs. The X11 core did not anticipate that...
Jim Gettys, Keith Packard
MOBICOM
2003
ACM
14 years 1 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...