Sciweavers

1323 search results - page 68 / 265
» Updatable Security Views
Sort
View
PERCOM
2009
ACM
14 years 4 months ago
Securing Body Sensor Networks: Sensor Association and Key Management
—Body Sensor Networks can be used to continuously monitor patients’ health. However, secure association of sensors with the patient and key management for providing integrity a...
Sye Loong Keoh, Emil C. Lupu, Morris Sloman
EUROPKI
2008
Springer
13 years 11 months ago
Efficient Generic Forward-Secure Signatures and Proxy Signatures
We propose a generic method to construct forward-secure signature schemes from standard signature schemes. The proposed construction is more computationally efficient than previous...
Basel Alomair, Krishna Sampigethaya, Radha Poovend...
SERP
2008
13 years 11 months ago
Use of Data Recharging for Personal Information Environment
In this paper we provide a new way of defining personal information environment and its framework using data recharging. Using this new approach, human intervention can significant...
Atif Farid Mohammad
SP
2000
IEEE
14 years 1 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob
AISM
2004
13 years 11 months ago
Computer Security Research: Approaches and Assumptions
Researchers, no matter their field, are faced with the problem of selecting an appropriate approach before conducting a study. The purpose of this paper is to provide an overview ...
Christopher Bolan, Daniel Mende