Sciweavers

2207 search results - page 363 / 442
» Security at the Internet Layer
Sort
View
CTRSA
2001
Springer
109views Cryptology» more  CTRSA 2001»
15 years 9 months ago
Uncheatable Distributed Computations
Computationally expensive tasks that can be parallelized are most efficiently completed by distributing the computation among a large number of processors. The growth of the Intern...
Philippe Golle, Ilya Mironov
114
Voted
ISW
2001
Springer
15 years 9 months ago
Suitability of a Classical Analysis Method for E-commerce Protocols
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Sigrid Gürgens, Javier Lopez
ICTAI
1999
IEEE
15 years 8 months ago
Cognitive Packet Networks
Reliability, security, scalability and QoS (Quality-of-Service) have become key issues as we envision the future Internet. This paper presents the "Cognitive Packet Network (C...
Erol Gelenbe, Zhiguang Xu, Esin Seref
NDSS
1998
IEEE
15 years 8 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
APCHI
2004
IEEE
15 years 8 months ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto