Sciweavers

595 search results - page 56 / 119
» Malware Defense Using Network Security Authentication
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 8 months ago
SRDP: Securing Route Discovery in DSR
Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered bot...
Jihye Kim, Gene Tsudik
112
Voted
CSREASAM
2006
15 years 4 months ago
MRAS: A Multi-Layered Remote Authentication System
: Accessing computer resources from off campus has been a continuing problem for both students and faculty, and this problem has been exacerbated by the growth of our graduate prog...
Wilfrid Mirville, Jamie Kobie, Michael Nelson
CCS
2005
ACM
15 years 8 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
145
Voted
CSREASAM
2004
15 years 4 months ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
102
Voted
NETWORK
2008
151views more  NETWORK 2008»
15 years 2 months ago
Minimizing information leakage in the DNS
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) have been developed and deployed ...
Scott Rose, Anastase Nakassis