Sciweavers

1970 search results - page 331 / 394
» Security Without Firewalls
Sort
View
IAJIT
2011
13 years 2 months ago
Social Issues in wireless sensor networks with healthcare perspective
: The recent advances in Wireless Sensor Networks have given rise to many application areas in healthcare. It has produced new field of Wireless Body Area Networks. Using wearable ...
Moshaddique Al Ameen, Kyung Sup Kwak
IJNSEC
2011
110views more  IJNSEC 2011»
13 years 2 months ago
An Anonymous Auction Protocol Based on GDH Assumption
The popularization and conveniences of Internet have changed traditional auction transactions into electronic auction via Internet. In 2006, Chang and Chang proposed an anonymous ...
Fuw-Yi Yang, Cai-Ming Liao
IJNSEC
2011
167views more  IJNSEC 2011»
13 years 2 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
IFIP
2010
Springer
13 years 2 months ago
Are BGP Routers Open to Attack? An Experiment
Abstract. The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been so...
Ludovico Cavedon, Christopher Kruegel, Giovanni Vi...
IJNSEC
2010
133views more  IJNSEC 2010»
13 years 2 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji