Sciweavers

849 search results - page 100 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
CCS
2000
ACM
14 years 4 days ago
Evaluating certificate status information mechanisms
A wide spectrum of certificate revocation mechanisms is currently in use. A number of them have been proposed by standardisation bodies, while some others have originated from aca...
John Iliadis, Diomidis Spinellis, Dimitris Gritzal...
CCS
2007
ACM
14 years 2 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
NCA
2003
IEEE
14 years 1 months ago
Admission Control in Peer Groups
Security in collaborative peer groups is an active research topic. Most previous work focused on key management without addressing an important pre-requisite: admission control, i...
Yongdae Kim, Daniele Mazzocchi, Gene Tsudik
INFOCOM
2006
IEEE
14 years 1 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
ECEH
2006
116views Healthcare» more  ECEH 2006»
13 years 9 months ago
Next Generation Network Infrastructure Enabling Telemonitoring Services
: In the next few decades one of the main problems to deal with in Western Europe is the aging of the population. The healthcare sector will face rising costs and increasing worklo...
Sietse Dijkstra, Erik van Essen, Robert Westers