Sciweavers

2904 search results - page 471 / 581
» Internet Infrastructure Security
Sort
View
APWEB
2007
Springer
14 years 5 months ago
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags
How can a RFID (Radio Frequency Identification Devices) system prove that two or more RFID tags are in the same location? Previous researchers have proposed yoking-proof and groupi...
Chih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan...
CEAS
2007
Springer
14 years 5 months ago
A Case for a Spam-Aware Mail Server Architecture
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
Abhinav Pathak, Sabyasachi Roy, Y. Charlie Hu
IPOM
2007
Springer
14 years 4 months ago
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems
Abstract. On the inter-domain Internet today, the address prefix origin in our BGP operations has become a major security concern. This critical problem can be stated simply as ...
Shih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan...
CCECE
2006
IEEE
14 years 4 months ago
A Hardware/Software Co-Design for RSVP-TE MPLS
This paper presents a hardware/software co-design for Multi Protocol Label Switching (MPLS) using RSVP-TE as a signaling protocol. MPLS is the protocol framework on which the atte...
Raymond Peterkin, Dan Ionescu
SOUPS
2006
ACM
14 years 4 months ago
Human selection of mnemonic phrase-based passwords
Textual passwords are often the only mechanism used to authenticate users of a networked system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to stre...
Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor