Sciweavers

479 search results - page 53 / 96
» cn 2008
Sort
View
CN
2006
117views more  CN 2006»
15 years 4 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
113
Voted
CN
2006
58views more  CN 2006»
15 years 4 months ago
Dynamically extending the Corral with native code for high-speed packet processing
By combining the Open Kernel Environment, a Click-like software model known as Corral and basic concepts of active networking, we allow third-party code to control the code organi...
Herbert Bos, Bart Samwel, Ilja Booij
CN
2006
124views more  CN 2006»
15 years 4 months ago
Packet classification using diagonal-based tuple space search
Multidimensional packet classification has attracted considerable research interests in the past few years due to the increasing demand on policy based packet forwarding and secur...
Fu-Yuan Lee, Shiuh-Pyng Shieh
CN
2006
85views more  CN 2006»
15 years 4 months ago
An efficient heuristic for selecting active nodes in wireless sensor networks
Energy saving is a paramount concern in wireless sensor networks (WSNs). A strategy for energy saving is to cleverly manage the duty cycle of sensors, by dynamically activating di...
Flávia Coimbra Delicato, Fábio Prott...
CN
2006
66views more  CN 2006»
15 years 4 months ago
Secure acknowledgment aggregation and multisignatures with limited robustness
In certain reliable group-oriented and multicast applications, a source needs to securely verify whether all (and if not all, which) intended receivers have received a message. How...
Claude Castelluccia, Stanislaw Jarecki, Jihye Kim,...