Sciweavers

1490 search results - page 217 / 298
» The Logic of Authentication Protocols
Sort
View
MSWIM
2005
ACM
14 years 2 months ago
Towards resilient geographic routing in WSNs
In this paper, we consider the security of geographical forwarding (GF) – a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their locati...
Nael B. Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu
GI
2005
Springer
14 years 2 months ago
Entity Recognition for Sensor Network Motes
d Abstract) Stefan Lucks1 , Erik Zenner2 , Andr´e Weimerskirch3 , Dirk Westhoff4 1 Theoretische Informatik, University of Mannheim, Germany 2 Erik Zenner, Cryptico A/S, Copenhagen...
Stefan Lucks, Erik Zenner, André Weimerskir...
HPDC
2002
IEEE
14 years 1 months ago
Flexibility, Manageability, and Performance in a Grid Storage Appliance
We present NeST, a flexible software-only storage appliance designed to meet the storage needs of the Grid. NeST has three key features that make it well-suited for deployment in...
John Bent, Venkateshwaran Venkataramani, Nick LeRo...
EUROCRYPT
1999
Springer
14 years 1 months ago
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yongge Wang, Yvo Desmedt
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
14 years 19 days ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...