Sciweavers

1656 search results - page 181 / 332
» Secure Computation Without Authentication
Sort
View
GRID
2006
Springer
13 years 10 months ago
ROAM: An Authorization Manager for Grids
The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible authorization system for the FusionGrid computational grid. ROAM builds on and exte...
Justin Burruss, T. W. Fredian, Mary R. Thompson
ADHOC
2007
109views more  ADHOC 2007»
13 years 10 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
14 years 4 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
ICPP
2006
IEEE
14 years 4 months ago
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...
Xiaomei Liu, Li Xiao
FSE
2010
Springer
146views Cryptology» more  FSE 2010»
14 years 1 months ago
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
This paper provides a unified framework for improving PRF (pseudorandom function) advantages of several popular MACs (message authentication codes) based on a blockcipher modeled a...
Mridul Nandi