Sciweavers

1102 search results - page 16 / 221
» Distributed Key Generation for the Internet
Sort
View
IMC
2009
ACM
14 years 2 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
WWW
2004
ACM
14 years 8 months ago
Next generation web technologies in content management
The development of information and communication technologies and the expansion of the Internet means that, nowadays, there are huge amounts of information available via these eme...
Jesús Villamor-Lugo, Luis Sánchez Fe...
INFOCOM
2006
IEEE
14 years 1 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 7 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
INFOCOM
2006
IEEE
14 years 1 months ago
To Peer or Not to Peer: Modeling the Evolution of the Internet's AS-Level Topology
— Internet connectivity at the AS level, defined in terms of pairwise logical peering relationships, is constantly evolving. This evolution is largely a response to economic, po...
Hyunseok Chang, Sugih Jamin, Walter Willinger