Sciweavers

1286 search results - page 11 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
ICPADS
2007
IEEE
14 years 1 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies
COMPSAC
2000
IEEE
13 years 12 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
DCC
2010
IEEE
13 years 7 months ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson
CCS
2008
ACM
13 years 9 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
EDOC
2007
IEEE
14 years 1 months ago
Survey of Traceability Approaches in Model-Driven Engineering
Models have been used in various engineering fields to help managing complexity and represent information in difbstraction levels, according to specific notations and stakeholde...
Ismênia Galvão, Arda Goknil