Sciweavers

15 search results - page 2 / 3
» ijsn 2006
Sort
View
IJSN
2006
96views more  IJSN 2006»
13 years 4 months ago
A new signature scheme without random oracles
In this paper, we propose a new signature scheme that is existentially unforgeable under a chosen message attack without random oracle. The security of our scheme depends on a new ...
Chik How Tan
IJSN
2006
116views more  IJSN 2006»
13 years 4 months ago
Secure collaborations over message boards
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...
Mahalingam Ramkumar, Nasir D. Memon
IJSN
2006
78views more  IJSN 2006»
13 years 4 months ago
An approach to synthesise safe systems
: Detectors are system components that identify whether the system is in a particular state. Detectors can be used to ensure arbitrary safety properties for systems, that is, they ...
Arshad Jhumka, Felix C. Freiling, Christof Fetzer,...
IJSN
2006
124views more  IJSN 2006»
13 years 4 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
IJSN
2006
76views more  IJSN 2006»
13 years 4 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li