Sciweavers

41 search results - page 7 / 9
» Trust but verify: accountability for network services
Sort
View
IJNSEC
2007
111views more  IJNSEC 2007»
13 years 6 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
CCS
2004
ACM
14 years 9 days ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
ENTCS
2008
390views more  ENTCS 2008»
13 years 5 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
ICNP
1999
IEEE
13 years 11 months ago
Fluid Analysis of Delay Performance for QoS Support in Wireless Networks
Providing quality of service (QoS) guarantees over wireless links requires thorough understanding and quantification of the interactions among the traffic source, the wireless cha...
Jeong Geun Kim, Marwan Krunz
JCSS
2006
102views more  JCSS 2006»
13 years 6 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh