Sciweavers

1923 search results - page 27 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
VLDB
2006
ACM
122views Database» more  VLDB 2006»
14 years 8 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang
IPCCC
2005
IEEE
14 years 2 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
CCS
2010
ACM
13 years 8 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
EDOC
2004
IEEE
14 years 6 days ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...