Sciweavers

849 search results - page 102 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
SPW
1997
Springer
13 years 12 months ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...
HUC
2007
Springer
14 years 2 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas
MSWIM
2009
ACM
14 years 2 months ago
A performance evaluation framework for fair solutions in ad hoc networks
Fairness in multihop ad hoc networks has received considerable attention in the literature. Many schemes have been proposed, which attempt to compute the “optimal” bit rates o...
Manos Dramitinos, Rémi Vannier, Isabelle Gu...
JAR
2008
115views more  JAR 2008»
13 years 7 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
APLAS
2010
ACM
13 years 8 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...