Sciweavers

4111 search results - page 25 / 823
» Security, Protocols, and Trust
Sort
View
NDSS
1998
IEEE
14 years 27 days ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 3 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
ESORICS
2004
Springer
14 years 2 months ago
A Vector Model of Trust for Developing Trustworthy Systems
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
Indrajit Ray, Sudip Chakraborty
ECR
2006
81views more  ECR 2006»
13 years 8 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 8 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan