Sciweavers

1779 search results - page 292 / 356
» Secure Communications in ATM Networks
Sort
View
SCN
2010
Springer
147views Communications» more  SCN 2010»
13 years 7 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
ICC
2007
IEEE
14 years 3 months ago
Reducing the Size of Rule Set in a Firewall
— A firewall’s complexity is known to increase with the size of its rule set. Complex firewalls are more likely to have configuration errors which cause security loopholes. ...
MyungKeun Yoon, Shigang Chen, Zhan Zhang
CCR
2007
108views more  CCR 2007»
13 years 9 months ago
Very low-cost internet access using KioskNet
Rural Internet kiosks in developing regions can cost-effectively provide communication and e-governance services to the poorest sections of society. A variety of technical and no...
Shimin Guo, Mohammad Hossein Falaki, Earl A. Olive...
FOCS
2007
IEEE
14 years 3 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
VIZSEC
2005
Springer
14 years 2 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...