Sciweavers

1365 search results - page 58 / 273
» Security applications of peer-to-peer networks
Sort
View
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
14 years 2 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
JNW
2008
97views more  JNW 2008»
13 years 7 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews
STORAGESS
2005
ACM
14 years 1 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
CSREASAM
2008
13 years 9 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner