Sciweavers

2081 search results - page 141 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
14 years 3 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
INFOCOM
2006
IEEE
14 years 2 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
INFOCOM
2008
IEEE
14 years 2 months ago
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System
Abstract—Today vehicle theft rate is very high, thus tracking/alarming systems are being deployed with an increasingly popularity. These systems however bear some limitations suc...
Hui Song, Sencun Zhu, Guohong Cao
NCA
2006
IEEE
14 years 2 months ago
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also ...
Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Be...
SAC
2010
ACM
14 years 3 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie