Sciweavers

6907 search results - page 11 / 1382
» Securing distributed adaptation
Sort
View
ICPPW
2005
IEEE
14 years 1 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
CSFW
1999
IEEE
13 years 11 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
13 years 11 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
ACISP
2008
Springer
14 years 1 months ago
Distributed Verification of Mixing - Local Forking Proofs Model
Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski