Sciweavers

688 search results - page 99 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
114
Voted
APSEC
1998
IEEE
15 years 6 months ago
wwHww : An Application Framework of Distributed Systems for Enduser-Initiative Development
The number of endusers using the Internet increases on the inside and outside of offices. Enduser-initiative development of applications has become important for automation of the...
Takeshi Chusho, Katsuya Fujiwara
145
Voted
ESAS
2007
Springer
15 years 8 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
126
Voted
CCS
2008
ACM
15 years 4 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
128
Voted
TWC
2008
156views more  TWC 2008»
15 years 2 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
TIT
2008
129views more  TIT 2008»
15 years 2 months ago
Cooperative Fading Regions for Decode and Forward Relaying
Abstract--Cooperative transmission protocols over fading channels are based on a number of relaying nodes to form virtual multiantenna transmissions. Diversity provided by these te...
Stefano Savazzi, Umberto Spagnolini