Sciweavers

1779 search results - page 71 / 356
» Secure Communications in ATM Networks
Sort
View
CCS
2010
ACM
13 years 8 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
BROADNETS
2006
IEEE
14 years 4 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
IPL
2008
72views more  IPL 2008»
13 years 10 months ago
Reducing communication costs in robust peer-to-peer networks
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robust to adversarial attack via Byzantine faults. Unfortunately, all of these resul...
Jared Saia, Maxwell Young
AWCC
2004
Springer
14 years 3 months ago
Securing Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...
IPPS
2005
IEEE
14 years 3 months ago
On the Impact of IPsec on Interactive Communications
Interactive communication services as telephony and video-conferences use the infrastructure of existing LANs and the Internet more and more. The advantages are obvious. For examp...
Jirka Klaue, Andreas Hess