Sciweavers

1777 search results - page 205 / 356
» Programming Cryptographic Protocols
Sort
View
CCS
2003
ACM
14 years 2 months ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning
FOSSACS
2003
Springer
14 years 2 months ago
When Ambients Cannot Be Opened
rized Verification by Probabilistic Abstraction . . . . . . . . . . . . . . . . 87 Tamarah Arons, Amir Pnueli, Lenore Zuck Genericity and the π-Calculus . . . . . . . . . . . . ....
Iovka Boneva, Jean-Marc Talbot
ACSAC
2002
IEEE
14 years 1 months ago
A Security Architecture for Object-Based Distributed Systems
Large-scale distributed systems present numerous security problems not present in local systems. In this paper we present a general security architecture for a large-scale object-...
Bogdan C. Popescu, Maarten van Steen, Andrew S. Ta...
DEXAW
2002
IEEE
80views Database» more  DEXAW 2002»
14 years 1 months ago
Private Auctions with Multiple Rounds and Multiple Items
For selling spectrum licenses economists have designed new auction types proceeding over several rounds and offering several licenses simultaneously. Communication between bidders...
Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Stei...
COMPSAC
2009
IEEE
14 years 1 months ago
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
—Countless challenges to preserving a user’s location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive...
Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Shar...