Sciweavers

1106 search results - page 73 / 222
» Automated Design of Security Protocols
Sort
View
TISSEC
2002
82views more  TISSEC 2002»
13 years 9 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
PERCOM
2010
ACM
13 years 8 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...
ASYNC
2004
IEEE
90views Hardware» more  ASYNC 2004»
14 years 1 months ago
Handshake Protocols for De-Synchronization
De-synchronization appears as a new paradigm to automate the design of asynchronous circuits from synchronous netlists. This paper studies different protocols for de-synchronizatio...
Ivan Blunno, Jordi Cortadella, Alex Kondratyev, Lu...
SENSYS
2005
ACM
14 years 3 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
TITB
2010
181views Education» more  TITB 2010»
13 years 4 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...