Sciweavers

241 search results - page 20 / 49
» Using Conservation of Flow as a Security Mechanism in Networ...
Sort
View
USENIX
2004
13 years 9 months ago
Reliability and Security in the CoDeeN Content Distribution Network
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running distributed services that interact with other resources on the Web. The CoDeeN C...
Limin Wang, KyoungSoo Park, Ruoming Pang, Vivek S....
CQRE
1999
Springer
14 years 23 days ago
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP link. In response to [SM98], Microsoft released extensions to the PPTP authentication me...
Bruce Schneier, Mudge, David Wagner
SASN
2003
ACM
14 years 1 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
AICT
2006
IEEE
126views Communications» more  AICT 2006»
14 years 2 months ago
A Framework to Add AAA Functionalities in IP Multicast
Multicasting, as an operational paradigm, has not been widely adopted until now, in spite of the advantages of its lower resource utilization and bandwidth conservation. This is d...
Salekul Islam, J. William Atwood
IFIP
2003
Springer
14 years 1 months ago
Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks
Abstract. Providing energy efficiency in MAC (Medium Access Control) layer, while achieving desirable throughput, is an important research issue in the area of wireless networking....
Jong-Mu Choi, Young-Bae Ko, Jai-Hoon Kim