Sciweavers

281 search results - page 54 / 57
» Scalable Protocols for Authenticated Group Key Exchange
Sort
View
JSAC
2010
170views more  JSAC 2010»
14 years 10 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
ICNP
2006
IEEE
15 years 10 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
CCR
2004
63views more  CCR 2004»
15 years 3 months ago
QoS-aware multicasting in DiffServ domains
Although many QoS-based multicast routing protocols have been proposed in recent years, most of them are based on per-flow resource reservation, which cannot be deployed within dif...
Zhi Li, Prasant Mohapatra
JOC
2011
157views more  JOC 2011»
14 years 10 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
MSS
2007
IEEE
76views Hardware» more  MSS 2007»
15 years 10 months ago
Implementing and Evaluating Security Controls for an Object-Based Storage System
This paper presents the implementation and performance evaluation of a real, secure object-based storage system compliant to the TIO OSD standard. In contrast to previous work, ou...
Zhongying Niu, Ke Zhou, Dan Feng, Hong Jiang, Fran...