Sciweavers

5511 search results - page 65 / 1103
» Security for Network Places
Sort
View
CAMAD
2006
IEEE
14 years 2 months ago
Three-tier satellite multicast security protocol based on ECMQV and IMC methods
Attila Altay Yavuz, Fatih Alagöz, Emin Anarim
ICDCSW
2000
IEEE
14 years 1 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
MOBISYS
2008
ACM
14 years 18 days ago
Virtualized in-cloud security services for mobile devices
Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, ...
ICDCSW
2005
IEEE
14 years 3 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
CORR
2007
Springer
115views Education» more  CORR 2007»
13 years 10 months ago
Random Linear Network Coding: A free cipher?
Abstract— We consider the level of information security provided by random linear network coding in network scenarios in which all nodes comply with the communication protocols y...
Luísa Lima, Muriel Médard, Joã...