Sciweavers

90 search results - page 18 / 18
» Asymmetric Group Key Agreement
Sort
View
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
ICDCS
2008
IEEE
13 years 11 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou
DSN
2002
IEEE
13 years 9 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
AICT
2010
IEEE
240views Communications» more  AICT 2010»
12 years 8 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
ECIS
2004
13 years 6 months ago
Measuring enterprise systems success: the importance of a multiple stakeholder perspective
: Organisations invest enormous amount of resources in acquiring Enterprise Systems (ES), presumably expecting positive impacts to the organisation and its functions. Despite the o...
Darshana Sedera, Guy G. Gable, Taizan Chan