A. Liu, Jason M. Kovacs, Chin-Tser Huang, M. Gouda
{"title":"A secure cookie protocol","authors":"A. Liu, Jason M. Kovacs, Chin-Tser Huang, M. Gouda","doi":"10.1109/ICCCN.2005.1523880","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523880","url":null,"abstract":"Cookies are the primary means for Web applications to authenticate HTTP requests and to maintain client states. Many Web applications (such as electronic commerce) demand a secure cookie protocol. Such a protocol needs to provide the following four services: authentication, confidentiality, integrity and antireplay. Several secure cookie protocols have been proposed in previous literature; however, none of them are completely satisfactory. In this paper, we propose a secure cookie protocol that is effective, efficient, and easy to deploy. In terms of effectiveness, our protocol provides all of the above four security services. In terms of efficiency, our protocol does not involve any database lookup or public key cryptography. In terms of deployability, our protocol can be easily deployed on an existing Web server, and it does not require any change to the Internet cookie specification. We implemented our secure cookie protocol using PHP, and the experimental results show that our protocol is very efficient.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sub-network mobility analysis in wireless sensor networks","authors":"Noseong Park, Daeyoung Kim, Jihoon Park, Y. Doh","doi":"10.1109/ICCCN.2005.1523921","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523921","url":null,"abstract":"We propose the special kind of the mobility so called sub-network mobility for wireless sensor networks. In the sub-network mobility, the strongly coupled nodes, which are attached to the same object, move together passively as the object moves. Strongly coupled nodes require a different mobility scheme from the conventional mobility mechanism due to the characteristic that the relative positions among them are not changed while they are moving following the object. Thus, we research into how to manage strongly coupled nodes and suggest a sub-network mobility scheme which uses a sub-network gateway to relay the packets from the nodes to the main-network. With mathematical modeling, we found the condition in which the proposed method outperforms the method which doesn't support sub-network mobility. The overheads of the proposed algorithm and the packet transmission performance are evaluated with ns-2 simulator.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126589002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network diversification-enabling innovation in network architecture and services","authors":"J. Turner","doi":"10.1109/ICCCN.2005.1523793","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523793","url":null,"abstract":"The rise and growth of the Internet is one of the great technology success stories of the twentieth century. Unfortunately, the size and scope of the public Internet now makes the introduction and deployment of new network innovations very difficult, leading many to observe that the core technology at the heart of the Internet has become ossified. While solutions too many of the IP protocol's limitations are well-understood, there has been remarkably little progress towards deployment of new capabilities. New network technologies face insurmountable barriers to entry, stifling the competitive forces that allow progress in other technology domains. At the same time, advances in electronics now make it both feasible and practical to deploy high performance network components with unprecedented flexibility and programmability. These capabilities can be used to enable a diverse collection of meta-networks to co-exist within a common physical infrastructure. Diversified networking can enable new network technologies to be developed and deployed on a large scale, stimulating innovation in both core network protocols and advanced services that combine computing and communication in creative new ways. It makes it possible for new network innovations to compete on an equal footing with legacy technologies, stimulating innovation and leading to a broad range of new services.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124214615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}