Sciweavers

671 search results - page 118 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
POPL
2005
ACM
14 years 8 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
ICRA
1994
IEEE
154views Robotics» more  ICRA 1994»
14 years 17 days ago
The Network Data Delivery Service: Real-Time Data Connectivity for Distributed Control Applications
The Network Data Delivery Service NDDS is a novel network data-sharing system. NDDS builds on the model of information producers sources and consumers sinks. Producers generate da...
Gerardo Pardo-Castellote, Stanley A. Schneider
EUROCRYPT
2004
Springer
14 years 5 days ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
TCS
2008
13 years 8 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
TWC
2008
138views more  TWC 2008»
13 years 8 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng