Sciweavers

215 search results - page 27 / 43
» Key Management for Encrypted broadcast
Sort
View
DMSN
2004
ACM
13 years 11 months ago
Confidence-based data management for personal area sensor networks
The military is working on embedding sensors in a "smart uniform" that will monitor key biological parameters to determine the physiological status of a soldier. The sol...
Nesime Tatbul, Mark Buller, Reed Hoyt, Steve Mulle...
IDC
2009
Springer
13 years 5 months ago
Efficient Broadcasting by Selective Forwarding
A major challenge faced in mobile ad hoc networks (MANETs) is locating devices for communication, especially in the case of high node mobility and sparse node density. Present solu...
Doina Bein, Ajoy Kumar Datta, Balaji Ashok Sathyan...
IEEEARES
2006
IEEE
14 years 1 months ago
Secure Enhanced Wireless Transfer Protocol
When IEEE 802.11i draft[1] proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage se...
Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
14 years 1 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 9 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang