Sciweavers

1251 search results - page 99 / 251
» On the security of group communication schemes
Sort
View
ICSNC
2007
IEEE
14 years 2 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
VTC
2007
IEEE
101views Communications» more  VTC 2007»
14 years 2 months ago
Secure Position-Based Routing for VANETs
— Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So fa...
Charles Harsch, Andreas Festag, Panos Papadimitrat...
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 8 months ago
Security for Wiretap Networks via Rank-Metric Codes
The problem of securing a network coding communication system against a wiretapper adversary is considered. The network implements linear network coding to deliver n packets from s...
Danilo Silva, Frank R. Kschischang
SIGCOMM
1997
ACM
14 years 12 days ago
A Flow-Based Approach to Datagram Security
Datagram services provide a simple, exible, robust, and communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwh...
Suvo Mittra, Thomas Y. C. Woo
ISN
1998
Springer
14 years 13 days ago
Secure Billing for Mobile Information Services in UMTS
This paper presents solutions developed in the ACTS ASPeCT project for advanced security features in UMTS. In particular, a secure billing scheme for value-added information servic...
Keith M. Martin, Bart Preneel, Chris J. Mitchell, ...