Sciweavers

5484 search results - page 198 / 1097
» Almost-Everywhere Secure Computation
Sort
View
WS
2005
ACM
15 years 10 months ago
Secure time synchronization service for sensor networks
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, ...
142
Voted
SUTC
2008
IEEE
15 years 11 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
16 years 4 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
134
Voted
IDTRUST
2009
ACM
15 years 11 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
128
Voted
CCS
2003
ACM
15 years 9 months ago
PPay: micropayments for peer-to-peer systems
Emerging economic P2P applications share the common need for an efficient, secure payment mechanism. In this paper, we present PPay, a micropayment system that exploits unique cha...
Beverly Yang, Hector Garcia-Molina