Sciweavers

31 search results - page 2 / 7
» Intermediary Non-repudiation Protocols
Sort
View
LCN
2007
IEEE
14 years 5 months ago
Secure Anonymous Broadcasting in Vehicular Networks
—Vehicular networks face a typical quandary in their requirement for communications that are at once secure and private. While the messages broadcast between vehicles and between...
Christine Laurendeau, Michel Barbeau
WECWIS
2003
IEEE
85views ECommerce» more  WECWIS 2003»
14 years 4 months ago
Intermediary Non-repudiation Protocols
In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In th...
Jose Antonio Onieva, Jianying Zhou, Mildrey Carbon...
INFOCOM
2005
IEEE
14 years 4 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig
SERVICES
2008
71views more  SERVICES 2008»
14 years 9 days ago
Identifying Opportunities for Web Services Security Performance Optimizations
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties, thereby assuring the participation of nonsecure tran...
Robert A. van Engelen, Wei Zhang
TPDS
2008
262views more  TPDS 2008»
13 years 10 months ago
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is...
Yunhua Koglin, Danfeng Yao, Elisa Bertino