نتایج جستجو برای: proxy
تعداد نتایج: 25930 فیلتر نتایج به سال:
According to the IEEE 802.11s draft standard, the mesh STA may maintain proxy information on STAs that are associated with a collocated access point or are behind a collocated portal. The proxy information plays a very important role in wireless mesh networks for additional delays may be introduced owing to the absence of proxy information during frame forwarding. While the method for maintaini...
Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytical...
Nowadays, big companies such as Google, Microsoft, which have adequate proxy servers, have perfectly implemented their web crawlers for a certain website in parallel. But due to lack of expensive proxy servers, it is still a puzzle for researchers to crawl large amounts of information from a single website in parallel. In this case, it is a good choice for researchers to use free public proxy s...
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can produce a valid signature as the proxy signer does in the proxy protected scheme. Therefore, Chen et al.’s proxy-protected scheme cannot protect the proxy signer from being forged by the original signers. We further f...
The Simultaneous Proxy Evaluation (SPE) architecture provides one way to measure the performance of proxy caches. It includes the novel ability to compare prefetching proxy cache performance, but poses a number of implementation challenges. In this report we describe our prototype implementation of SPE, the Rutgers Online Proxy Evaluator (ROPE). We discuss a number of issues raised during devel...
In a proxy re-encryption scheme, a ciphertext for Alice can be converted into a ciphertext for Bob with the help of a semi-trusted proxy, while the proxy gets no information about the messages encrypted under either key during the conversion. Proxy re-encryption has become more and more popular these years due to its practical applications. In this paper, we propose a fully secure proxy re-encr...
In 2004, Yang et al. proposed an efficient (t, n) threshold proxy signature scheme with known signers. However, Maimani et al. showed that a malicious original signer can forge a valid proxy signature for any message in Yang et al.’s scheme and further proposed an improvement to remedy such an attack. In this paper, we will show that in Maimani et al.s improvement, a malicious original or proxy...
Proxy signatures, introduced by Mambo, Usuda and Okamoto, allow a designated person to sign on behalf of an original signer. Braid groups has been playing an important role in the theory of cryptography as these are non commutative groups used in cryptography. Some digital signature schemes have been given but no proxy signature has been introduced over braid groups. In this paper we have propo...
Multimedia proxy plays an important role in media streaming applications. In this paper, we propose an architecture for multimedia proxy across wireless Internet. By considering multiple objectives of multimedia proxy, we design a unified cost metric to measure proxy performance in wireless Internet. Furthermore, we propose a cost-based replacement policy for wireless Internet to improve the pe...
This paper presents an identity based multi-proxy multisigncryption scheme from pairings. In this scheme a proxy signcrypter group could authorized as a proxy agent by the cooperation of all members in the original signcrypter group. Then the proxy signcryption can be generated by the cooperation of all the signcrypters in the authorized proxy signcrypter group on the behalf of the original sig...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید