Sciweavers

712 search results - page 28 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
GLOBECOM
2008
IEEE
13 years 8 months ago
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 3 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
VLDB
2007
ACM
187views Database» more  VLDB 2007»
14 years 9 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
14 years 2 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ICWN
2003
13 years 10 months ago
Distributed Energy Aware MAC Layer Protocol for Wireless Sensor Networks
Due to the fact that sensor nodes are untethered and unattended, energy management is a critical issue in communication mechanism of a wireless sensor network. In this paper, we a...
Ramaraju Kalidindi, Rajgopal Kannan, S. Sitharama ...