Sciweavers

772 search results - page 123 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
CCS
2008
ACM
13 years 11 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
JCP
2008
119views more  JCP 2008»
13 years 9 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
ICDCS
2009
IEEE
14 years 6 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
GI
2003
Springer
14 years 2 months ago
Policy Based Management for Critical Infrastructure Protection
: Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both ...
Gwendal Le Grand, Franck Springinsfeld, Michel Rig...
AGENTS
1997
Springer
14 years 1 months ago
Designing Behaviors for Information Agents
To facilitate the rapid development and open system interoperability of autonomous agents we need to carefully specify and effectively implement various classes of agent behaviors...
Keith Decker, Anandeep Pannu, Katia P. Sycara, Mik...