Sciweavers

195 search results - page 8 / 39
» Secure Broadcasting
Sort
View
ADHOC
2010
97views more  ADHOC 2010»
13 years 7 months ago
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 2 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
RTAS
1996
IEEE
13 years 11 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
DSN
2002
IEEE
14 years 19 days ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
14 years 10 hour ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool