Sciweavers

55 search results - page 6 / 11
» Notes On The Design Of An Internet Adversary
Sort
View
EUROCRYPT
2003
Springer
14 years 1 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
TISSEC
2002
82views more  TISSEC 2002»
13 years 7 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
QOFIS
2004
Springer
14 years 1 months ago
The Case for Source Address Dependent Routing in Multihoming
Multihoming is currently widely adopted to provide fault tolerance and traffic engineering capabilities. It is expected that, as telecommunication costs decrease, its adoption will...
Marcelo Bagnulo, Alberto García-Martí...
HT
2009
ACM
13 years 5 months ago
Retrieving broken web links using an approach based on contextual information
In this short note we present a recommendation system for automatic retrieval of broken Web links using an approach based on contextual information. We extract information from th...
Juan Martinez-Romo, Lourdes Araujo
WS
2004
ACM
14 years 1 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...