Sciweavers

1331 search results - page 19 / 267
» Trust Establishment in Distributed Networks: Analysis and Mo...
Sort
View
WIMOB
2007
IEEE
14 years 3 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
HICSS
2000
IEEE
132views Biometrics» more  HICSS 2000»
14 years 1 months ago
The Impacts of Relational and Trust Development Training on Virtual Teams: An Exploratory Investigation
Virtual teams are becoming common place in many organizations. These teams are geographically distributed and communicate via computer-mediated communication systems. Two factors ...
Peggy M. Beranek
CCS
2000
ACM
14 years 1 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 22 days ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 9 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...