Sciweavers

3972 search results - page 75 / 795
» Design of the iSCSI Protocol
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
TISSEC
2002
82views more  TISSEC 2002»
13 years 8 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
JCM
2010
98views more  JCM 2010»
13 years 7 months ago
High Speed Data Routing in Vehicular Sensor Networks
—In this paper, we show through a simple secure symmetric key based protocol design and experiments the feasibility of secure data collection in a vehicular sensor networks. This...
Harry Gao, Seth Utecht, Gregory Patrick, George Hs...
IJDSN
2010
147views more  IJDSN 2010»
13 years 3 months ago
Position-Based Aggregator Node Election in Wireless Sensor Networks
In this paper, we introduce PANEL, a position-based aggregator node election protocol for wireless sensor networks. The novelty of PANEL with respect to other aggregator node elec...
Levente Buttyán, Péter Schaffer
COMSUR
2011
213views Hardware» more  COMSUR 2011»
12 years 8 months ago
Securing BGP - A Literature Survey
Abstract—The Border Gateway Protocol (BGP) is the Internet’s inter-domain routing protocol. One of the major concerns related to BGP is its lack of effective security measures,...
Geoff Huston, Mattia Rossi, Grenville J. Armitage