Sciweavers

3420 search results - page 180 / 684
» A Language-Based Approach to Security
Sort
View
ICDCSW
2007
IEEE
15 years 10 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
LCN
2007
IEEE
15 years 10 months ago
Secure Anonymous Broadcasting in Vehicular Networks
—Vehicular networks face a typical quandary in their requirement for communications that are at once secure and private. While the messages broadcast between vehicles and between...
Christine Laurendeau, Michel Barbeau
ECUMN
2007
Springer
15 years 10 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
ICICS
2007
Springer
15 years 10 months ago
A Framework for Game-Based Security Proofs
Abstract. To be accepted, a cryptographic scheme must come with a proof that it satisfies some standard security properties. However, because cryptographic schemes are based on no...
David Nowak
ICDIM
2006
IEEE
15 years 10 months ago
Exposing Web Services to Business Partners: Security and Quality of Service Issue
— Delivering QoS and ensuring security of Web Services (WS) based architecture is critical and constitutes a significant challenge because of its dynamic and unpredictable nature...
Yann Le Blevec, Chirine Ghedira, Djamal Benslimane...