Sciweavers

905 search results - page 98 / 181
» Public key distribution through
Sort
View
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
14 years 2 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
EUROCRYPT
2004
Springer
14 years 2 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
EOR
2011
127views more  EOR 2011»
13 years 3 months ago
Methodology for determining the acceptability of system designs in uncertain environments
In practice, managers often wish to ascertain that a particular engineering design of a production system meets their requirements. The future environment of this design is likely...
Jack P. C. Kleijnen, Henri Pierreval, Jin Zhang
CN
2008
128views more  CN 2008»
13 years 9 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
COMCOM
2010
136views more  COMCOM 2010»
13 years 9 months ago
D-MORE: Dynamic mesh-based overlay peer-to-peer infrastructure
Traditionally, Internet Service Providers (ISPs) have to interconnect with content providers to provide network services to customers. The current business model that connectivity...
Jun Lei, Xiaoming Fu, Dieter Hogrefe