Sciweavers

5476 search results - page 194 / 1096
» Resettably Secure Computation
Sort
View
ICSOC
2003
Springer
15 years 10 months ago
Secure Service Provision in Ad Hoc Networks
Radu Handorean, Gruia-Catalin Roman
ICTCS
2003
Springer
15 years 10 months ago
Security-Aware Program Transformations
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ICTCS
2003
Springer
15 years 10 months ago
Compositional Verification of Secure Streamed Data: A Case Study with EMSS
Fabio Martinelli, Marinella Petrocchi, Anna Vaccar...
IWNAS
2008
IEEE
15 years 11 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...