Sciweavers

595 search results - page 63 / 119
» New architecture for intra-domain network security issues
Sort
View
ICALP
2009
Springer
14 years 9 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
CSSE
2008
IEEE
14 years 3 months ago
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker
Abstract: The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, securit...
Prabhu Shankar Kaliappan, Hartmut Koenig, Vishnu K...
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 3 months ago
The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 2 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
CCGRID
2001
IEEE
14 years 12 days ago
While You're Away: A System for Load-Balancing and Resource Sharing Based on Mobile Agents
While You're Away (WYA) is a distributed system that aggregates the computational power of individual computer systems. WYA introduces the notion of Roaming Computations - Ja...
Niranjan Suri, Paul T. Groth, Jeffrey M. Bradshaw