Sciweavers

1251 search results - page 112 / 251
» On the security of group communication schemes
Sort
View
CCS
2004
ACM
14 years 1 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
IWCMC
2006
ACM
14 years 2 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
ATC
2007
Springer
14 years 2 months ago
An Architecture for Self-healing Autonomous Object Groups
Abstract. Jgroup/ARM is a middleware for developing and operating dependable distributed Java applications. Jgroup integrates the distributed object model of Java RMI with the obje...
Hein Meling
ICDE
1998
IEEE
83views Database» more  ICDE 1998»
14 years 9 months ago
Grouping Techniques for Update Propagation in Intermittently Connected Databases
We consider an environment where one or more servers carry databases that are of interest to a community of clients. The clients are only intermittently connected to the server fo...
Sameer Mahajan, Michael J. Donahoo, Shamkant B. Na...
GLOBECOM
2010
IEEE
13 years 6 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate