Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
: The Internet is experiencing an overwhelming growth that will have a negative impact on its performance and quality of service. In this paper we describe a new architecture that ...
Juan Carlos Diaz y Carballo, Alan Dearle, Richard ...
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...