Sciweavers

97 search results - page 4 / 20
» Implementing a Secure Autonomous Bootstrap Mechanism for Con...
Sort
View
IJCAT
2007
100views more  IJCAT 2007»
13 years 7 months ago
INCA: qualitative reference framework for incentive mechanisms in P2P networks
: The existence of peer-to-peer networks is due to benefits brought by decentralisation of control and distribution of resources. It is expected that the usage of such networks wi...
Andrew Roczniak, Abdulmotaleb El-Saddik, Pierre L&...
CN
2007
172views more  CN 2007»
13 years 7 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ESAS
2007
Springer
14 years 1 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
JSAC
2010
77views more  JSAC 2010»
13 years 5 months ago
MMS: An autonomic network-layer foundation for network management
Abstract—Networks cannot be managed without communication among geographically distributed network devices and control agents. Unfortunately, computer networks today lack an auto...
Hemant Gogineni, Albert G. Greenberg, David A. Mal...