Sciweavers

947 search results - page 145 / 190
» Provable Implementations of Security Protocols
Sort
View
NDSS
1997
IEEE
14 years 2 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
PDPTA
2004
13 years 11 months ago
Web Service Robust GridFTP
In this paper, we discuss reliable and secure file transfer middleware called NaradaBrokering. It is our goal to show that reliability features can be decoupled from the implementa...
Sang Lim, Geoffrey Fox, Shrideep Pallickara, Marlo...
FPL
2007
Springer
154views Hardware» more  FPL 2007»
14 years 4 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...
LCN
2005
IEEE
14 years 3 months ago
Automatic VPN Client Recovery from IPsec Pass-through Failures
Network Address Translation (NAT) is often used in routers that connect home and small-office networks to the Internet. Unfortunately, NAT may not interoperate well with many pro...
José Carlos Brustoloni
ASAP
2004
IEEE
123views Hardware» more  ASAP 2004»
14 years 1 months ago
A Packet Scheduling Algorithm for IPSec Multi-Accelerator Based Systems
IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these al...
Fabien Castanier, Alberto Ferrante, Vincenzo Piuri