Sciweavers

2358 search results - page 248 / 472
» A Secure Pervasive Environment
Sort
View
CISS
2008
IEEE
15 years 10 months ago
MIMO-assisted channel-based authentication in wireless networks
— Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
153
Voted
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
15 years 9 months ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson
DEXA
2003
Springer
134views Database» more  DEXA 2003»
15 years 9 months ago
Concurrent and Real-Time Update of Access Control Policies
Abstract. Access control policies are security policies that govern access to resources. Real-time update of access control policies, that is, updating policies while they are in e...
Indrakshi Ray, Tai Xin
CCS
1998
ACM
15 years 8 months ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
134
Voted
ACSW
2003
15 years 5 months ago
Flexible Enterprise Access Control with Object-oriented View Specification
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
Mark Evered