Sciweavers

5891 search results - page 148 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ICC
2007
IEEE
254views Communications» more  ICC 2007»
15 years 8 months ago
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory...
Yong Wang, Byrav Ramamurthy
APNOMS
2006
Springer
15 years 8 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
EDBT
2008
ACM
147views Database» more  EDBT 2008»
16 years 4 months ago
BITPEER: continuous subspace skyline computation with distributed bitmap indexes
In this paper, we propose a bitmap approach for efficient subspace skyline computation in a distributed setting. Our approach computes extended skylines which have been shown to i...
Katerina Fotiadou, Evaggelia Pitoura
ACSAC
2004
IEEE
15 years 8 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
OTM
2004
Springer
15 years 9 months ago
Application of Grid Security to Personal Distributed Environments
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile...
Allan Tomlinson, Scarlet Schwiderski-Grosche