• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13,464
Next 10 →

A Secure Routing Protocol for Ad Hoc Networks

by Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer , 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract - Cited by 508 (0 self) - Add to MetaCart
with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.

Secure Group Communications Using Key Graphs

by Chung Kei Wong, Mohamed Gouda , Simon S. Lam - SIGCOMM '98 , 1998
"... Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of au ..."
Abstract - Cited by 556 (17 self) - Add to MetaCart
of authorized receivers. As a result, securing group communications (i.e., providing confidentiality, integrity, and authenticity of messages delivered between group members) will become a critical networking issue. In this paper, we present a novel solution to the scalability problem of group/multicast key

How To Prove Yourself: Practical Solutions to Identification and Signature Problems

by Amos Fiat, Adi Shamir , 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract - Cited by 1028 (1 self) - Add to MetaCart
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring

The dining cryptographers problem: Unconditional sender and recipient untraceability

by David Chaum - Journal of Cryptology , 1988
"... Abstract. Keeping confidential who sends which messages, in a world where any physical transmission can be traced to its origin, seems impossible. The solu-tion presented here is unconditionally or cryptographically secure, depending on whether it is based on one-time-use keys or on public keys, res ..."
Abstract - Cited by 577 (2 self) - Add to MetaCart
Abstract. Keeping confidential who sends which messages, in a world where any physical transmission can be traced to its origin, seems impossible. The solu-tion presented here is unconditionally or cryptographically secure, depending on whether it is based on one-time-use keys or on public keys

The tragedy of the commons

by Garrett Hardin - Science , 1968
"... At the end of a thoughtful article on the future of nuclear war, Wiesner and York (1) concluded that: “Both sides in the arms race are... confronted by the dilemma of steadily increasing military power and steadily de-creasing national security. It is our considered professional judgment that this d ..."
Abstract - Cited by 2521 (0 self) - Add to MetaCart
that this dilemma has no technical solution. If the great powers continue to look for solutions in the area of science and technology only, the result will be to worsen the situation.” I would like to focus your attention not on the subject of the article (national secu-rity in a nuclear world) but on the kind

BGP and Security Solution Elements

by Meiyuan Zhao, Sean W. Smith, Dartmouth College
"... he Border Gateway Protocol (BGP) is the standard way autonomous systems (ASes) within the Internet establish and maintain routing information between their domains. However, this protocol implicitly depends on hearsay, since each BGP speaker believes and repeats what it has heard from other speakers ..."
Abstract - Add to MetaCart
speakers. This dependency introduces security problems, since a malicious speaker can forge claims that will then be propagated throughout the network, corrupting routing. There have been several proposed solutions to address these BGP vulnerabilities. A natural approach that provides strong security

Xen and the art of virtualization

by Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield - IN SOSP , 2003
"... Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security or fun ..."
Abstract - Cited by 2010 (35 self) - Add to MetaCart
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security

Monopolistic competition and optimum product diversity. The American Economic Review,

by Avinash K Dixit , Joseph E Stiglitz , Harold Hotelling , Nicholas Stern , Kelvin Lancaster , Stiglitz , 1977
"... The basic issue concerning production in welfare economics is whether a market solution will yield the socially optimum kinds and quantities of commodities. It is well known that problems can arise for three broad reasons: distributive justice; external effects; and scale economies. This paper is c ..."
Abstract - Cited by 1911 (5 self) - Add to MetaCart
The basic issue concerning production in welfare economics is whether a market solution will yield the socially optimum kinds and quantities of commodities. It is well known that problems can arise for three broad reasons: distributive justice; external effects; and scale economies. This paper

Integrating Security Solutions to Support . . .

by R. Sinnott, C. Bayliss, T. Doherty, D. Martin, C. Millar, G. Stewart, J. Watt, A. Asenov, G. Roy, S. Roy, C. Davenhall, B. Harbulot, M. Jones , 2008
"... ... (nanoCMOS) is developing a research infrastructure for collaborative electronics research across multiple institutions in the UK with especially strong industrial and commercial involvement. Unlike other domains, the electronics industry is driven by the necessity of protecting the intellectual ..."
Abstract - Add to MetaCart
property of the data, designs and software associated with next generation electronics devices and therefore requires fine-grained security. Similarly, the project also demands seamless access to large scale high performance compute resources for atomic scale device simulations and the capability to manage

Gemini Security Solutions

by M. Cooper, Y. Dzambasow, P. Hesse, S. Joseph, Van Dyke Technologies, R. Nicholas , 2005
"... Internet X.509 Public Key Infrastructure: ..."
Abstract - Add to MetaCart
Internet X.509 Public Key Infrastructure:
Next 10 →
Results 1 - 10 of 13,464
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University