We've been recently working on what seems like a neat new clock
synchronization protocol, which will hopefully offer proactive security
(recovery from penetrations, see http://www.hrl.il.ibm.com/proactive).
Surprisingly, it also appears a very practical protocol. It has been some
time since I last worked on clock synchronization, so I wonder, what is the
state of the art - practical protocols (any substantially change in NTP
recently or any serious alternative), and protocols designed to withstand
attackers (of course I'll be esp. interested if there's anything with some
recovery properties!!).

Thanks for any pointers.

Best Regards,
Amir Herzberg
Manager, E-Business and Security Technologies
IBM Research - Haifa Lab (Tel Aviv Office)
http://www.hrl.il.ibm.com
New e-mail: [EMAIL PROTECTED]
New Lotus notes mail: amir herzberg/haifa/ibm@IBMIL


Reply via email to