Sciweavers

743 search results - page 96 / 149
» Secure Signature Schemes based on Interactive Protocols
Sort
View
WS
2004
ACM
14 years 1 months ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras
JSAC
2006
111views more  JSAC 2006»
13 years 7 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
AINA
2005
IEEE
14 years 1 months ago
A Scheme for Testing Privacy State in Pervasive Sensor Networks
More and more sensor networks will be deployed in the place where people are living, studying, and working. These sensor networks bring us the convenience of accessing information...
Yingpeng Sang, Hong Shen
QSIC
2007
IEEE
14 years 1 months ago
A Pattern-Based Constraint Description Approach for Web Services
Current WSDL-based description specifies only the operation signatures and locations of Web services. It is widely recognized that a richer description is needed. WS-Security, WS-...
Qianxiang Wang, Min Li, Na Meng, Yonggang Liu, Hon...
EUROCRYPT
2000
Springer
13 years 11 months ago
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
We show that although unconditionally secure quantum bit commitment is impossible, it can be based upon any family of quantum one-way permutations. The resulting scheme is uncondit...
Paul Dumais, Dominic Mayers, Louis Salvail