Sciweavers

757 search results - page 40 / 152
» How secure are secure interdomain routing protocols
Sort
View
IPCCC
2005
IEEE
14 years 1 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi
IPCCC
2005
IEEE
14 years 1 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
JALC
2006
87views more  JALC 2006»
13 years 7 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 18 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
CCR
2004
116views more  CCR 2004»
13 years 7 months ago
An empirical study of "bogon" route advertisements
An important factor in the robustness of the interdomain routing system is whether the routers in autonomous systems (ASes) filter routes for "bogon" address space--i.e....
Nick Feamster, Jaeyeon Jung, Hari Balakrishnan