Sciweavers

478 search results - page 59 / 96
» Secure Sockets Layer
Sort
View
PET
2009
Springer
14 years 2 months ago
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
Today’s Internet architecture makes no deliberate attempt to provide identity privacy—IP addresses are, for example, often static and the consistent use of a single IP address ...
Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren,...
ICIW
2007
IEEE
14 years 1 months ago
Towards a Framework for Dynamic Verification of Peer-to-Peer Systems
Ensuring dependability and security of Peer-toPeer (P2P) systems is an intricate task due to the autonomous and volatile nature of peers and the decentralization that characterize...
Theofrastos Koulouris, George Spanoudakis, Theocha...
IEEEIAS
2007
IEEE
14 years 1 months ago
Addressing privacy issues in CardSpace
CardSpace (formerly known as InfoCard) is a Digital Identity Management system that has recently been adopted by Microsoft. In this paper we identify two security flaws in CardSp...
Waleed A. Alrodhan, Chris J. Mitchell
SAINT
2007
IEEE
14 years 1 months ago
A HIP Based Network Mobility Protocol
– The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and ch...
Szabolcs Nováczki, László Bok...
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
14 years 1 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...