Sciweavers

4111 search results - page 782 / 823
» Security, Protocols, and Trust
Sort
View
AINA
2006
IEEE
14 years 2 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
14 years 2 months ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang
LCN
2006
IEEE
14 years 2 months ago
Privacy-Preserving Quick Authentication in Fast Roaming Networks
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang
VTC
2006
IEEE
107views Communications» more  VTC 2006»
14 years 2 months ago
Architecture of an Always Best Connected Vehicular Communication Gateway
Abstract— MobilitY and CollAboRative Work in European Vehicle Emergency NeTworks (MYCAREVENT) is an European Project of the 6th Framework Program [1], and aims to optimize the Eu...
Erik Weiss, M. Muehleisen, Carl-Herbert Rokitansky...
ACNS
2006
Springer
78views Cryptology» more  ACNS 2006»
14 years 2 months ago
DSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the hig...
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Bl...