Sciweavers

57 search results - page 5 / 12
» Reengineering the Internet for Better Security
Sort
View
ICSNC
2007
IEEE
14 years 2 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 3 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
14 years 1 months ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson
WIKIS
2009
ACM
14 years 3 months ago
Experience report - Wiki for law firms
This paper shows the experiences of a law firm with adopting Wiki Webs for knowledge management and collaboration over the last two years. Wikis created a business advantage for t...
Urs Egli, Peter Sommerlad
EUROPAR
2005
Springer
14 years 2 months ago
On AAA Based on Brokers and Pre-encrypted Keys in MIPv6
For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the suppo...
Hoseong Jeon, Min Young Chung, Hyunseung Choo