Sciweavers

277 search results - page 40 / 56
» Secure Aggregation in Large Scale Overlay Networks
Sort
View
MTA
2008
96views more  MTA 2008»
13 years 8 months ago
Proxy-assisted periodic broadcast for video streaming with multiple servers
Large scale video streaming over Internet requires a large amount of resources such as server I/O bandwidth, network bandwidth. A number of video delivery techniques can be used to...
Ewa Kusmierek, David Hung-Chang Du
SOUPS
2010
ACM
14 years 10 days ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 8 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
INFOCOM
2005
IEEE
14 years 2 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig
JNSM
2010
110views more  JNSM 2010»
13 years 3 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...