Sciweavers

674 search results - page 94 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
ICDCS
2008
IEEE
14 years 2 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
CIS
2006
Springer
13 years 11 months ago
Senior Executives Commitment to Information Security - from Motivation to Responsibility
For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understandin...
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo...
CCS
2008
ACM
13 years 9 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
INFOCOM
1996
IEEE
13 years 11 months ago
Time Scale Analysis of Explicit Rate Allocation in ATM Networks
Rate based congestion management for computer communication networks has been the focus of considerable research recently. Dierent variants to the end-to-end rate based algorithm ...
Anna Charny, K. K. Ramakrishnan
GCC
2003
Springer
14 years 24 days ago
SemanticPeer: An Ontology-Based P2P Lookup Service
Locating content efficiently and conveniently is the key issue in P2P systems. In this paper we present SemanticPeer, an Ontology-Based P2P lookup service, to address this problem,...
Jing Tian, Yafei Dai, Xiaoming Li