Sciweavers

5891 search results - page 196 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
145
Voted
AINA
2005
IEEE
15 years 10 months ago
Reducing Security Overhead for Mobile Networks
Security of mobile communications comes with the cost of computational overhead. Reducing the overhead in security computations is critical to ensure the overall performance of a ...
Fangguo Zhang, Yi Mu, Willy Susilo
150
Voted
CN
2007
117views more  CN 2007»
15 years 4 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
139
Voted
AMW
2010
15 years 6 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
DSN
2004
IEEE
15 years 8 months ago
Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems
Recent developments in the field of object-based fault tolerance and the advent of the first OMG FTCORBA compliant middleware raise new requirements for the design process of dist...
Panagiotis Katsaros, Constantine Lazos
ICDCS
2000
IEEE
15 years 8 months ago
An Efficient Cache Maintenance Scheme for Mobile Environment
In this paper we present a new cache maintenance scheme, called AS, suitable for wireless mobile environment. Our scheme integrates mobility management scheme of Mobile IP with ca...
Anurag Kahol, Ramandeep Singh Khurana, Sandeep K. ...