Sciweavers

97 search results - page 7 / 20
» Multi-party Computation with Hybrid Security
Sort
View
ISPA
2005
Springer
14 years 1 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
ATAL
2005
Springer
14 years 1 months ago
Coordination of quantum internet agents
Intelligent agents in the quantum internet are supposed to operate on networked hybrid quantum computers to individually or jointly accomplish their goals by means of both classic...
Matthias Klusch
IEEEARES
2006
IEEE
14 years 1 months ago
Modeling Dependable Systems using Hybrid Bayesian Networks
A hybrid Bayesian Network (BN) is one that incorporates both discrete and continuous nodes. In our extensive applications of BNs for system dependability assessment the models are...
Martin Neil, Manesh Tailor, Norman E. Fenton, Davi...
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
13 years 11 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
LCN
2007
IEEE
14 years 1 months ago
Secure Anonymous Broadcasting in Vehicular Networks
—Vehicular networks face a typical quandary in their requirement for communications that are at once secure and private. While the messages broadcast between vehicles and between...
Christine Laurendeau, Michel Barbeau