Sciweavers

688 search results - page 98 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
128
Voted
ICALP
2003
Springer
15 years 7 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
CN
2006
69views more  CN 2006»
15 years 2 months ago
A framework for realistic and systematic multicast performance evaluation
Previous multicast research often makes commonly accepted but unverified assumptions on network topologies and group member distribution in simulation studies. In this paper, we p...
Li Lao, Jun-Hong Cui, Mario Gerla
IWCMC
2006
ACM
15 years 8 months ago
Resolving islands of security problem for DNSSEC
The DNS Security Extensions (DNSSEC) were developed to add origin authentication and integrity. DNSSEC defined a public key infrastructure over DNS tree hierarchy for the public ...
Eunjong Kim, Ashish Gupta, Batsukh Tsendjav, Danie...
ESORICS
2010
Springer
15 years 3 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
121
Voted
CORR
2007
Springer
156views Education» more  CORR 2007»
15 years 2 months ago
Analysis of a Mixed Strategy for Multiple Relay Networks
Abstract— Infrastructure based wireless communications systems as well as ad hoc networks experience a growing importance in present-day telecommunications. An increased density ...
Peter Rost, Gerhard Fettweis