Sciweavers

496 search results - page 49 / 100
» Providing Secure Services in Peer-to-Peer Communications Net...
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
ICDCSW
2008
IEEE
14 years 3 months ago
Real-Time Data Services for Cyber Physical Systems
Cyber Physical Systems (CPSs) have grand visions with great socio-economic impacts such as blackout-free electricity supply and real-time disaster recovery. A key challenge is pro...
Kyoung-Don Kang, Sang Hyuk Son
MOBICOM
1996
ACM
14 years 29 days ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
IEEEIAS
2008
IEEE
14 years 3 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
CCS
2009
ACM
14 years 3 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...