Sciweavers

62 search results - page 9 / 13
» A Network Based Replay Portal
Sort
View
ICDCS
2005
IEEE
15 years 5 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
88
Voted
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
124
Voted
ICS
2009
Tsinghua U.
15 years 4 months ago
Exploring pattern-aware routing in generalized fat tree networks
New static source routing algorithms for High Performance Computing (HPC) are presented in this work. The target parallel architectures are based on the commonly used fattree netw...
Germán Rodríguez, Ramón Beivi...
ETFA
2008
IEEE
15 years 6 months ago
e-based inter-enterprise supply chain Kanban for demand and order fulfilment management
– The philosophy of Kanban is that parts and materials should be supplied at the very moment they are needed in the factory manufacturing process. e-based inter-enterprise supply...
Linton L. S. Chai
103
Voted
JCSS
2006
102views more  JCSS 2006»
14 years 11 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh