A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
A compact and fast hybrid signature scheme for multicast packet authentication
1999
Proceedings of the 6th ACM conference on Computer and communications security - CCS '99
This paper proposes a compact and fast hybrid signature scheme that can be used to solve the problem of packet source authentication for multicast. ...
This scheme can be viewed as an improvement to off-line/on-line signature schemes, in that the signature size overhead is much smaller. ...
scheme and to Shai Halevi and Charanjit Jutla for help in the design of the primitives. ...
doi:10.1145/319709.319722
dblp:conf/ccs/Rohatgi99
fatcat:bywfh2m7vvatdlzo3l6vmosco4
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
2009
IEEE INFOCOM 2009 - The 28th Conference on Computer Communications
Desirable properties for a multicast authentication scheme also include small communication overhead, tolerance to packet loss, and resistance against malicious attacks. ...
It provides fast signing/verification and buffering-free data processing, which make it one of the fastest multicast authentication schemes to date in terms of end-to-end computational latency (on the ...
TV-HORS has a much smaller signature size and strong security for stream multicast authentication.
IX. ...
doi:10.1109/infcom.2009.5062037
dblp:conf/infocom/WangKHN09
fatcat:v3imwufv6vc5poap34tmx6zuei
A Survey on Future Internet Security Architectures
2016
IEEE Access
Motivated by emerging demands for security, mobility, and distributed networking, many research projects have been initiated to design the future Internet from a clean slate. ...
Furthermore, we compare these projects and discuss their pros and cons. Open security issues are pointed out for directing future research. ...
Besides the content-centric network architectures, the MobilityFirst is designed to deal with the names and network addresses to achieve mobility, which is actually a hybrid name and address scheme. ...
doi:10.1109/access.2016.2596705
fatcat:ny3dd4naaref7ktsmu32xzosbe
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
2012
IEEE Communications Surveys and Tutorials
This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks. ...
It also discusses future directions and open problems of general Identity-Based Cryptography and its application in mobile ad hoc networks. ...
and an authenticated broadcast scheme based on symmetric keys and a corresponding signature scheme. ...
doi:10.1109/surv.2011.020211.00045
fatcat:bcgqnhfzxrdvlfoq6tmucsjdea
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends
[article]
2021
arXiv
pre-print
This open-design paradigm is paving the way for an unprecedented wave of innovation and experimentation by reducing the time of designing, testing, and adopting new protocols; enabling a customized, top-down ...
Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols. ...
[115] presented ELMO, a multicast scheme based on programmable P4 switches for datacenter applications. ...
arXiv:2102.00643v2
fatcat:izxi645kozdc5ibfsqp2y2foau
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends
2021
IEEE Access
This open-design paradigm is paving the way for an unprecedented wave of innovation and experimentation by reducing the time of designing, testing, and adopting new protocols; enabling a customized, top-down ...
Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols. ...
ACKNOWLEDGEMENT This material is based upon work supported by the National Science Foundation under grant numbers 1925484 and 1829698, funded by the Office of Advanced Cyberinfrastructure (OAC). ...
doi:10.1109/access.2021.3086704
fatcat:2jgbxj2cbfbp7fawkxwrztbbia
Recent Advances in Information-Centric Networking based Internet of Things (ICN-IoT)
[article]
2018
arXiv
pre-print
Obvious benefits of ICN in terms of fast and efficient data delivery and improved reliability raises ICN as highly promising networking model for Internet of Things (IoTs) like environments. ...
Subsequently, we present a comprehensive survey on ICN based caching, naming, security and mobility approaches for IoTs with appropriate classification. ...
ACKNOWLEDGMENT This research is supported by the Computer Engineering Department (CPED) of the University of Engineering and Technology (UET), Taxila, Pakistan under a Full-time research scholarship, and ...
arXiv:1710.03473v3
fatcat:psedk3gg3bbjjhxvit5vae5xxu
Real Tournament – mobile context‐aware gaming for the next generation
2004
Electronic library
Through the process of development, deployment, and evaluation of the game, we can have a better view of the impact of Mobile IPv6 on future network services and applications. ...
As part of the new research collaboration between Lancaster University, Cisco Systems, Microsoft Research and Orange -MIPv6 Systems Research Lab (MSRL), such a mobile context-aware multiplayer game is ...
In essence, our packet marking scheme is a hybrid way of digitally signing the whole IP packet, including the headers and payload, and this is placed in an IPv6 extension header. ...
doi:10.1108/02640470410520113
fatcat:w6st7uv5gzdh5fq6jdrjnh4uye
Theory and Practice of Bloom Filters for Distributed Systems
2012
IEEE Communications Surveys and Tutorials
This survey article presents a number of frequently used and useful probabilistic techniques. ...
In this survey, we give an overview of the basic and advanced techniques, reviewing over 20 variants and discussing their application in distributed systems, in particular for caching, peer-to-peer systems ...
ACKNOWLEDGEMENTS This work was supported by TEKES as part of the Future Internet program of TIVIT (Finnish Strategic Centre for Science, Technology and Innovation in the field of ICT). ...
doi:10.1109/surv.2011.031611.00024
fatcat:ziz4fwmd5jhizjvjpltaejhnmy
2020 Index IEEE Transactions on Vehicular Technology Vol. 69
2020
IEEE Transactions on Vehicular Technology
+ Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex ...
Revocable Data-Sharing Scheme in VANETs; TVT Dec. 2020 15933-15946 Hoseini, S.A., Ding, M., Hassan, M., and Chen, Y., Analyzing the Impact of Molecular Re-Radiation on the MIMO Capacity in High-Frequency ...
., +, TVT Dec. 2020 15668-15681
Authentication
A Lightweight Authentication and Attestation Scheme for In-Transit Vehi-
cles in IoV Scenario. ...
doi:10.1109/tvt.2021.3055470
fatcat:536l4pgnufhixneoa3a3dibdma
Named Data Networking: A survey
2016
Computer Science Review
Internet was developed as a packet data network where users and data sources (server) with specific IP addresses interacted over a pre-established communication channel. ...
result of either packet loss or lifetime expiry), and time-to-completion (total time required to satisfy a content request), etc. ...
It is used to authenticate a given key for a particular packet in an application [8] . Pournaghshband, et al. ...
doi:10.1016/j.cosrev.2016.01.001
fatcat:z256vu3lwrdnpkzsdnruxtlosi
Wireless Sensor Network Security
2013
International Journal of Distributed Sensor Networks
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section ...
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. ...
For the LDM and the LDW a new public key becomes active after every signature, for the HORS scheme this happens after r signatures. ...
doi:10.1155/2013/362385
fatcat:2ph46uukonbtbdkc5q6t4mvgcq
Active network vision and reality
1999
Proceedings of the seventeenth ACM symposium on Operating systems principles - SOSP '99
However, we believe that we have made substantial progress towards providing a more flexible network layer while at the same time addressing the performance and security concerns raised by the presence ...
In this paper, we argue our progress towards the original vision and the difficulties that we have not yet resolved in three areas that characterize a "pure" active network: the capsule model of programmability ...
We are grateful to the members of the SDS group at MIT, and in particular wish to thank Tom Anderson, Steve Garland, John Guttag, Hank Levy and David Tennenhouse for their encouragement and guidance. ...
doi:10.1145/319151.319156
dblp:conf/sosp/Wetherall99
fatcat:wyijun2dhjcwbmdpifcwg7shli
Privacy, Discovery, and Authentication for the Internet of Things
[article]
2017
arXiv
pre-print
To address the need for better privacy in both the IoT and the mobile landscape, we develop two protocols for private service discovery and private mutual authentication. ...
Finally, we discuss some privacy limitations of the Apple AirDrop protocol (a peer-to-peer file sharing mechanism) and show how to improve the privacy of Apple AirDrop using our private mutual authentication ...
We thank Bruno Blanchet for his help in verifying the unlinkability property of our modified private mutual authentication protocol in Section 4. ...
arXiv:1604.06959v3
fatcat:45marxb3xzekflyu35yx2b3uay
Named Data Networking in Vehicular Ad hoc Networks: State-of-the-Art and Challenges
2019
IEEE Communications Surveys and Tutorials
Subsequently, we cover in detail, NDN-based naming, routing and forwarding, caching, mobility, and security mechanism for VANET. ...
Inspired by the extensive research results in NDN-based VANET, in this paper, we provide a detailed and systematic review of NDN-driven VANET. ...
Bouk et al. extended this work with efficient Compact Trie management scheme for VCCN in [105] . ...
doi:10.1109/comst.2019.2894816
fatcat:qxljrw7bcrdgfko3itxprhsige
« Previous
Showing results 1 — 15 out of 155 results