Sciweavers

964 search results - page 26 / 193
» On Securely Scheduling a Meeting
Sort
View
CCS
2003
ACM
14 years 2 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
ESORICS
2007
Springer
14 years 5 months ago
Security of Multithreaded Programs by Compilation
Abstract. Information security is a pressing challenge for mobile code technologies. In order to claim end-to-end security of mobile code, it is necessary to establish that the cod...
Gilles Barthe, Tamara Rezk, Alejandro Russo, Andre...
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
14 years 3 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
14 years 4 months ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconfigurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka
ACSAC
2003
IEEE
14 years 4 months ago
Forum Session: Security for Wireless Sensor Networks
Wireless networks of low-power sensing devices are poised to become a ubiquitous part of the computing landscape. Proposed applications of these networks range from health care to...
David Carman, Daniel Coffin, Bruno Dutertre, Vipin...