Sciweavers

615 search results - page 35 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
SCN
2008
Springer
166views Communications» more  SCN 2008»
13 years 8 months ago
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Abstract-- Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applicat...
Pandurang Kamat, Arati Baliga, Wade Trappe
EUSAI
2007
Springer
14 years 2 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany
ICPPW
2009
IEEE
13 years 6 months ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
EUROCRYPT
1998
Springer
14 years 26 days ago
A Formal Treatment of Remotely Keyed Encryption
Remotely keyed encryption schemes (RKESs), introduced by Blaze 6], support high-bandwidth cryptographic applications (such as encrypted video conferences) in which long-lived secre...
Matt Blaze, Joan Feigenbaum, Moni Naor
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
14 years 3 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq