Sciweavers

1150 search results - page 208 / 230
» Beacon Based Authentication
Sort
View
ESAS
2006
Springer
13 years 9 months ago
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networ...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
DRM
2008
Springer
13 years 9 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
EPEW
2008
Springer
13 years 9 months ago
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems ...
Huqiu Zhang, Aad P. A. van Moorsel
ICWS
2007
IEEE
13 years 9 months ago
Rich Services: The Integration Piece of the SOA Puzzle
One of the key challenges to successful systems-ofsystems integration using Web services technologies is how to address crosscutting architectural concerns such as policy manageme...
Matthew Arrott, Barry Demchak, Vina Ermagan, Claud...