Sciweavers

281 search results - page 54 / 57
» Scalable Protocols for Authenticated Group Key Exchange
Sort
View
JSAC
2010
170views more  JSAC 2010»
13 years 2 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
ICNP
2006
IEEE
14 years 1 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
CCR
2004
63views more  CCR 2004»
13 years 7 months ago
QoS-aware multicasting in DiffServ domains
Although many QoS-based multicast routing protocols have been proposed in recent years, most of them are based on per-flow resource reservation, which cannot be deployed within dif...
Zhi Li, Prasant Mohapatra
JOC
2011
157views more  JOC 2011»
13 years 2 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
MSS
2007
IEEE
76views Hardware» more  MSS 2007»
14 years 1 months ago
Implementing and Evaluating Security Controls for an Object-Based Storage System
This paper presents the implementation and performance evaluation of a real, secure object-based storage system compliant to the TIO OSD standard. In contrast to previous work, ou...
Zhongying Niu, Ke Zhou, Dan Feng, Hong Jiang, Fran...