Network protocols

Results: 10979



#Item
811Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2007-07-26 16:56:51
812

Untraceable Fair Network Payment Protocols with Off-line TTP Chih-Hung Wang Department of Computer Science and Information Engineering National Chiayi University 300 University Road, Chiayi, Taiwan 600, R.O.C.

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-09-01 21:55:04
    813Computing / Internet / Internet protocols / Domain name system / Cache / Internet Standards / DNS spoofing / Name server / Load balancing / Content delivery network / Time to live / Comparison of DNS server software

    ECO-DNS: Expected Consistency Optimization for DNS Chen Chen Carnegie Mellon University

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:11
    814Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

    Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:15
    815

    Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de

    Add to Reading List

    Source URL: www.nigam.info

    Language: English - Date: 2014-06-16 14:53:59
      816Software / Computing / System software / Internet Standards / Internet protocols / Network management / System administration / Balabit / Science and technology in Hungary / Syslog-ng / Telenor / Dubai Islamic Bank

      REFERENCE REVIEW list of companies using BalaBit products BALABIT - RERERENCE REVIEW2000-2013 BalaBit IT Security ■ All rights reserved. ■ www.balabit.com Copyright

      Add to Reading List

      Source URL: www.balabit.com

      Language: English - Date: 2015-04-07 13:20:00
      817Authentication protocols / Symmetric-key cryptography / Computer network security / IP / Kerberos / NeedhamSchroeder protocol / Cryptography

      Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

      Add to Reading List

      Source URL: seclab.stanford.edu

      Language: English - Date: 2010-07-17 01:14:15
      818Software engineering / Computing / Computer programming / World Wide Web / Functional programming / Yesod / Iteratee / Snap / Network protocols / Monad / Haskell / Glasgow Haskell Compiler

      The Functional Web Warp: A Haskell Web Server Michael Snoyman • Suite Solutions R

      Add to Reading List

      Source URL: steve.vinoski.net

      Language: English - Date: 2011-05-01 15:01:27
      819Computing / Network architecture / Internet / Internet Standards / Routing protocols / Internet protocols / Routing / Computer networking / Border Gateway Protocol / Router / Forwarding plane / Control plane

      Peer Pressure: Exerting Malicious Influence on Routers at a Distance Max Schuchard1 , Christopher Thompson2 , Nicholas Hopper1 , and Yongdae Kim3 1 Department of Computer Science and Engineering, University of Minnesota

      Add to Reading List

      Source URL: www-users.cs.umn.edu

      Language: English - Date: 2013-07-08 10:49:22
      UPDATE