Sciweavers

5891 search results - page 81 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
130
Voted
EDOC
2004
IEEE
15 years 7 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
134
Voted
SAINT
2003
IEEE
15 years 9 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
115
Voted
EUROCRYPT
1998
Springer
15 years 8 months ago
A Formal Treatment of Remotely Keyed Encryption
Remotely keyed encryption schemes (RKESs), introduced by Blaze 6], support high-bandwidth cryptographic applications (such as encrypted video conferences) in which long-lived secre...
Matt Blaze, Joan Feigenbaum, Moni Naor
144
Voted
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 10 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
129
Voted
HPDC
2002
IEEE
15 years 8 months ago
Lightweight Self-Organizing Frameworks for Metacomputing
A novel component-based, service-oriented framework for distributed metacomputing is described. Adopting a provider-centric view of resource sharing, this project emphasizes light...
Vaidy S. Sunderam, Dawid Kurzyniec