Sciweavers

224 search results - page 17 / 45
» Secrecy in Untrusted Networks
Sort
View
ALGOSENSORS
2009
Springer
13 years 11 months ago
On Active Attacks on Sensor Network Key Distribution Schemes
This paper concerns sensor network key distribution schemes (KDS) based on symmetric-key techniques. We analyze the problem of active attacks against such schemes. By active attack...
Stefan Dziembowski, Alessandro Mei, Alessandro Pan...
CCR
1999
138views more  CCR 1999»
13 years 6 months ago
Context-agile encryption for high speed communication networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
WS
2006
ACM
14 years 20 days ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
CCS
1999
ACM
13 years 11 months ago
Using Smartcards to Secure a Personalized Gambling Device
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...
William Aiello, Aviel D. Rubin, Martin Strauss
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
14 years 1 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi