Sciweavers

739 search results - page 96 / 148
» Security Challenges in Cloud Computing
Sort
View
ICNP
2003
IEEE
15 years 9 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
ESAS
2007
Springer
15 years 10 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
SASN
2006
ACM
15 years 10 months ago
Seven cardinal properties of sensor network broadcast authentication
We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, su...
Mark Luk, Adrian Perrig, Bram Whillock
EUROSEC
2010
ACM
15 years 9 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
CSREAPSC
2006
15 years 5 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal