Sciweavers

41 search results - page 5 / 9
» Trust but verify: accountability for network services
Sort
View
NDSS
2005
IEEE
14 years 14 days ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
13 years 11 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
IPPS
2007
IEEE
14 years 1 months ago
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a...
Limin Wang, Sandeep S. Kulkarni
GLOBECOM
2008
IEEE
14 years 1 months ago
Transport of Long-Range Dependent Traffic in Single-Hop and Multi-Hop IEEE 802.11e Networks
 Long-range dependence (LRD) is a widely verified property of traffic crossing the wireless LAN radio interface. LRD severely affects network performance yielding longer queuing...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
JNW
2008
150views more  JNW 2008»
13 years 6 months ago
Quality-Aware Cooperative Proxy Caching for Video Streaming Services
By applying a proxy mechanism widely used in WWW systems to video streaming systems, low-delay and high-quality video distribution can be accomplished without imposing extra load o...
Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murat...