Sciweavers

947 search results - page 146 / 190
» Provable Implementations of Security Protocols
Sort
View
CONEXT
2008
ACM
13 years 11 months ago
Networking is IPC: a guiding principle to a better internet
This position paper outlines a new network architecture that is based on the fundamental principle that networking is interprocess communication (IPC). In this model, application ...
John Day, Ibrahim Matta, Karim Mattar
NETWORKING
2007
13 years 11 months ago
Using PANA for Mobile IPv6 Bootstrapping
One of the current challenge of the Mobile IPv6 Working Group at the IETF is to dynamically assign to a Mobile Node its Home Agent, Home Address and to setup necessary security ass...
Julien Bournelle, Jean Michel Combes, Maryline Lau...
SNPD
2004
13 years 11 months ago
Payment-Based Email
Spam is a major problem facing email today, and current solutions are ineffective. This paper presents our progress towards defining and implementing a payment-based email deliver...
David A. Turner, Ni Deng
SIGCOMM
2010
ACM
13 years 10 months ago
R3: resilient routing reconfiguration
Network resiliency is crucial to IP network operations. Existing techniques to recover from one or a series of failures do not offer performance predictability and may cause serio...
Ye Wang, Hao Wang, Ajay Mahimkar, Richard Alimi, Y...
CRYPTO
2006
Springer
106views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
On Robust Combiners for Private Information Retrieval and Other Primitives
Abstract. Let A and B denote cryptographic primitives. A (k, m)robust A-to-B combiner is a construction, which takes m implementations of primitive A as input, and yields an implem...
Remo Meier, Bartosz Przydatek