Sciweavers

127 search results - page 20 / 26
» Routing Protocol Security Using Symmetric Key Based Techniqu...
Sort
View
HOST
2009
IEEE
14 years 2 months ago
Secure IP-Block Distribution for Hardware Devices
—EDA vendors have proposed a standard for the sharing of IP among vendors to be used in the design and development of IP for FPGAs. Although, we do not propose any attacks, we sh...
Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar...
CCS
2009
ACM
14 years 8 months ago
Quantifying maximal loss of anonymity in protocols
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
Han Chen, Pasquale Malacaria
SAC
2004
ACM
14 years 1 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
IPPS
2005
IEEE
14 years 1 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante
ICDCS
2009
IEEE
14 years 4 months ago
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile envir...
Donggang Liu