Sciweavers

610 search results - page 96 / 122
» Predicate-Based Key Exchange
Sort
View
EUROCRYPT
2001
Springer
14 years 1 days ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul
ICOIN
2001
Springer
13 years 12 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
IWQOS
2001
Springer
13 years 12 months ago
On Selection of Paths for Multipath Routing
Abstract. Multipath routing schemes distribute traffic among multiple paths instead of routing all the traffic along a single path. Two key questions that arise in multipath rout...
Srihari Nelakuditi, Zhi-Li Zhang
SPW
2001
Springer
13 years 12 months ago
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Pekka Nikander
VLDB
2001
ACM
110views Database» more  VLDB 2001»
13 years 12 months ago
Comparing Hybrid Peer-to-Peer Systems
“Peer-to-peer” systems like Napster and Gnutella have recently become popular for sharing information. In this paper, we study the relevant issues and tradeoffs in designing a...
Beverly Yang, Hector Garcia-Molina