Sciweavers

338 search results - page 52 / 68
» A Secure Certificate for Secure Group Communication
Sort
View
PDPTA
2008
13 years 10 months ago
Intrusion-Tolerant Dissemination in Large-Scale Systems
Abstract - With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust i...
Kim Potter Kihlstrom, Robin Elliott, Kelsey Marshm...
MSWIM
2006
ACM
14 years 2 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
ACSAC
2001
IEEE
14 years 7 days ago
Implementing the Intrusion Detection Exchange Protocol
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
AGENTS
1997
Springer
14 years 23 days ago
Yenta: A Multi-Agent, Referral-Based Matchmaking System
Many important and useful applications for software agents require multiple agents on a network that communicate with each other. Such agents must find each other and perform a u...
Leonard N. Foner
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
14 years 2 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik