Sciweavers

NDSS
1998
IEEE
14 years 4 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
NDSS
1998
IEEE
14 years 4 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
NDSS
1998
IEEE
14 years 4 months ago
Credential Management and Secure Single Login for SPKM
The GSS-API [20, 21] offers security services independent of underlying mechanisms. A possible GSS-mechanism is the Simple Public Key Mechanism (SPKM) specified in [1]. In this pa...
Detlef Hühnlein
NDSS
1998
IEEE
14 years 4 months ago
The Multilayer Firewall
We present a new security technology called the Multilayer Firewall. We argue that it is useful in some situations for which other approaches, such as cryptographically protected ...
Dan M. Nessett, Polar Humenn
NDSS
1998
IEEE
14 years 4 months ago
Attack Detection Methods for All-Optical Networks
This paper focuses on theoretical methods for detecting intentional attacks upon the infrastructure of an all-optical network. Applications of existing methods used in traditional...
Muriel Médard, Douglas Marquis, Stephen R. ...
NDSS
1998
IEEE
14 years 4 months ago
What Will Probably Happen
Dan McDonald