نتایج جستجو برای: proxy

تعداد نتایج: 25930  

Journal: :JNW 2010
Shih Tsung Liang

According to the IEEE 802.11s draft standard, the mesh STA may maintain proxy information on STAs that are associated with a collocated access point or are behind a collocated portal. The proxy information plays a very important role in wireless mesh networks for additional delays may be introduced owing to the absence of proxy information during frame forwarding. While the method for maintaini...

2003

Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytical...

2016
Xiaoming Jiang Jinqiao Shi Qingfeng Tan Wentao Zhang Xuebin Wang Muqian Chen

Nowadays, big companies such as Google, Microsoft, which have adequate proxy servers, have perfectly implemented their web crawlers for a certain website in parallel. But due to lack of expensive proxy servers, it is still a puzzle for researchers to crawl large amounts of information from a single website in parallel. In this case, it is a good choice for researchers to use free public proxy s...

Journal: :Informatica, Lith. Acad. Sci. 2007
Pei-Hui Huang Hsiang-An Wen Chih-Hung Wang Tzonelih Hwang

Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can produce a valid signature as the proxy signer does in the proxy protected scheme. Therefore, Chen et al.’s proxy-protected scheme cannot protect the proxy signer from being forged by the original signers. We further f...

2001
Brian D. Davison Chandrasekar Krishnan

The Simultaneous Proxy Evaluation (SPE) architecture provides one way to measure the performance of proxy caches. It includes the novel ability to compare prefetching proxy cache performance, but poses a number of implementation challenges. In this report we describe our prototype implementation of SPE, the Rutgers Online Proxy Evaluator (ROPE). We discuss a number of issues raised during devel...

2009
Hongbing Wang Zhenfu Cao

In a proxy re-encryption scheme, a ciphertext for Alice can be converted into a ciphertext for Bob with the help of a semi-trusted proxy, while the proxy gets no information about the messages encrypted under either key during the conversion. Proxy re-encryption has become more and more popular these years due to its practical applications. In this paper, we propose a fully secure proxy re-encr...

Journal: :I. J. Network Security 2013
Samaneh Mashhadi

In 2004, Yang et al. proposed an efficient (t, n) threshold proxy signature scheme with known signers. However, Maimani et al. showed that a malicious original signer can forge a valid proxy signature for any message in Yang et al.’s scheme and further proposed an improvement to remedy such an attack. In this paper, we will show that in Maimani et al.s improvement, a malicious original or proxy...

Journal: :IACR Cryptology ePrint Archive 2008
Girraj Kumar Verma

Proxy signatures, introduced by Mambo, Usuda and Okamoto, allow a designated person to sign on behalf of an original signer. Braid groups has been playing an important role in the theory of cryptography as these are non commutative groups used in cryptography. Some digital signature schemes have been given but no proxy signature has been introduced over braid groups. In this paper we have propo...

2001
Zhe Xiang Qian Zhang Wenwu Zhu Yuzhuo Zhong

Multimedia proxy plays an important role in media streaming applications. In this paper, we propose an architecture for multimedia proxy across wireless Internet. By considering multiple objectives of multimedia proxy, we design a unified cost metric to measure proxy performance in wireless Internet. Furthermore, we propose a cost-based replacement policy for wireless Internet to improve the pe...

Journal: :CoRR 2006
Sunder Lal Tej Singh

This paper presents an identity based multi-proxy multisigncryption scheme from pairings. In this scheme a proxy signcrypter group could authorized as a proxy agent by the cooperation of all members in the original signcrypter group. Then the proxy signcryption can be generated by the cooperation of all the signcrypters in the authorized proxy signcrypter group on the behalf of the original sig...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید