Sciweavers

1653 search results - page 182 / 331
» Timed analysis of security protocols
Sort
View
139
Voted
DIMVA
2004
15 years 4 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
114
Voted
AINA
2007
IEEE
15 years 6 months ago
Collision prevention using group communication for asynchronous cooperative mobile robots
The paper presents a fail-safe mobility management and a collision prevention platform for a group of asynchronous cooperative mobile robots. The fail-safe platform consists of a ...
Rami Yared, Xavier Défago, Matthias Wiesman...
JOC
2000
181views more  JOC 2000»
15 years 2 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
134
Voted
HPCC
2005
Springer
15 years 8 months ago
A Hybrid Web Server Architecture for Secure e-Business Web Applications
Nowadays the success of many e-commerce applications, such as on-line banking, depends on their reliability, robustness and security. Designing a web server architecture that keep...
Vicenç Beltran, David Carrera, Jordi Guitar...
139
Voted
IEEESCC
2007
IEEE
15 years 9 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung