Sciweavers

1365 search results - page 37 / 273
» Security applications of peer-to-peer networks
Sort
View
CSE
2009
IEEE
13 years 11 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
APNOMS
2006
Springer
13 years 11 months ago
An Architectural Framework for Network Convergence Through Application Level Presence Signaling
Over the past few years we have witnessed steady progress toward convergence in communications. We believe we are now witnessing nce beyond just media transport. Further, abstract ...
Atanu Mukherjee
NSDI
2008
13 years 10 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
SAC
2010
ACM
14 years 2 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
NETWORKING
2004
13 years 9 months ago
Secure Reverse Communication in a Multicast Tree
Abstract. Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast a...
Josep Domingo-Ferrer, Antoni Martínez-Balle...