Sciweavers

224 search results - page 3 / 45
» Secrecy in Untrusted Networks
Sort
View
DCOSS
2008
Springer
15 years 6 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
CCS
2007
ACM
15 years 8 months ago
Offline untrusted storage with immediate detection of forking and replay attacks
We address the problem of using an untrusted server with only a trusted timestamping device (TTD) to provide trusted storage for a large number of clients, where each client may o...
Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarme...
127
Voted
DSN
2007
IEEE
15 years 10 months ago
A Lightweight Mechanism for Dependable Communication in Untrusted Networks
Michael Rogers, Saleem Bhatti
NDSS
2003
IEEE
15 years 9 months ago
SiRiUS: Securing Remote Untrusted Storage
Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan ...