Sciweavers

151 search results - page 30 / 31
» Secrecy and Authenticity Types for Secure Distributed Messag...
Sort
View
COMCOM
2006
194views more  COMCOM 2006»
13 years 7 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
CCS
2011
ACM
12 years 7 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...
OOPSLA
2010
Springer
13 years 6 months ago
Cross-language, type-safe, and transparent object sharing for co-located managed runtimes
As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, object-oriented (OO) programming langua...
Michal Wegiel, Chandra Krintz
CCGRID
2006
IEEE
14 years 1 months ago
SSB : A Grid-based Infrastructure for HLA Systems
Service Oriented EXtensible Modeling and Simulation Supporting Environment Architecture (SO-XMSSEA) is presented based on XMSF thinking and the new technology development of web s...
Xu Li-juan, Peng Xiao-yuan
DBSEC
2003
157views Database» more  DBSEC 2003»
13 years 9 months ago
Systematic Development of a Family of Fair Exchange Protocols
: Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange...
Paul D. Ezhilchelvan, Santosh K. Shrivastava