Sciweavers

5484 search results - page 143 / 1097
» Almost-Everywhere Secure Computation
Sort
View
TDSC
2011
14 years 11 months ago
Securing Topology Maintenance Protocols for Sensor Networks
Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia,...

Lecture Notes
401views
17 years 2 months ago
Introduction to Computer Networking
The lecture notes cover the following topics, Course Overview , Data Communications and Networking Overview , Data Transmission , Transmission Media , Signal Encoding Techniques ...
Raj Jain
AINA
2007
IEEE
15 years 10 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
GCC
2005
Springer
15 years 9 months ago
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile ...
Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Ki...
ICALP
2005
Springer
15 years 9 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...