Sciweavers

60 search results - page 7 / 12
» Data Certification
Sort
View
PERCOM
2005
ACM
14 years 10 months ago
Securing Wireless Networks in a University Environment
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communicat...
Jochen Eisinger, Peter Winterer, Bernd Becker
CIKM
2005
Springer
14 years 3 months ago
A robot ontology for urban search and rescue
The goal of this Robot Ontology effort is to develop and begin to populate a neutral knowledge representation (the data structures) capturing relevant information about robots and...
Craig Schlenoff, Elena Messina
CSE
2009
IEEE
14 years 2 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
AMC
2005
218views more  AMC 2005»
13 years 10 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
JLP
2010
142views more  JLP 2010»
13 years 5 months ago
Relational bytecode correlations
We present a calculus for tracking equality relationships between values through pairs of bytecode programs. The calculus may serve as a certification mechanism for noninterferenc...
Lennart Beringer