Sciweavers

148 search results - page 12 / 30
» Bracket Capabilities for Distributed Systems Security
Sort
View
ASIACRYPT
2000
Springer
13 years 11 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
POLICY
2009
Springer
14 years 2 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
ATC
2007
Springer
14 years 1 months ago
A Distributed Self-healing Data Store
Due to the huge amount of integrated devices and sensors in everyday objects ubiquitous systems are in vicinity and will be deployed in large scales in the near future. We expect t...
Wolfgang Trumler, Jörg Ehrig, Andreas Pietzow...
MATA
2004
Springer
189views Communications» more  MATA 2004»
14 years 1 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
CRITIS
2009
13 years 8 months ago
Towards Early Warning Systems - Challenges, Technologies and Architecture
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...