Sciweavers

609 search results - page 114 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 7 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
CORR
2006
Springer
109views Education» more  CORR 2006»
13 years 7 months ago
Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks
n source and destination pairs randomly located in an area want to communicate with each other. Signals transmitted from one user to another at distance r apart are subject to a po...
Ayfer Özgür, Olivier Lévêqu...
ENTCS
2006
140views more  ENTCS 2006»
13 years 7 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
ENTCS
2006
155views more  ENTCS 2006»
13 years 7 months ago
Biomolecular Agents as Multi-behavioural Concurrent Objects
In recent years, there has been increasing interest in computational models of biological systems based on various calculi of communicating processes, such as the stochastic pi-ca...
Denys Duchier, Céline Kuttler
CN
2007
96views more  CN 2007»
13 years 7 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang