Sciweavers

718 search results - page 120 / 144
» Operational Semantics of Security Protocols
Sort
View
USS
2010
13 years 5 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
FI
2010
143views more  FI 2010»
13 years 2 months ago
Implementing Value Added Applications in Next Generation Networks
: One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs) are also telec...
Yeh-Chin Ho, Yi-Bing Lin, Ren-Huang Liou, Yuan-Kua...
ICNP
2006
IEEE
14 years 1 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
APPROX
2004
Springer
121views Algorithms» more  APPROX 2004»
14 years 1 months ago
Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption
A quantum encryption scheme (also called private quantum channel, or state randomization protocol) is a one-time pad for quantum messages. If two parties share a classical random s...
Andris Ambainis, Adam Smith
ENTCS
2007
94views more  ENTCS 2007»
13 years 7 months ago
Virtual Organizations in Arigatoni
Arigatoni is a lightweight overlay network that deploys the Global Computing Paradigm over the Internet. Communication for over the behavioral units of the overlay is performed by...
Michel Cosnard, Luigi Liquori, Raphaël Chand