Sciweavers

36 search results - page 4 / 8
» A Secure Two Phase Locking Protocol
Sort
View
RTDB
2001
114views more  RTDB 2001»
14 years 11 months ago
Mobile Distributed Real-Time Database Systems
Research in the concurrency control of real-time data access over mobile networks is receiving growing attention. With possibly lengthy transmission delay and frequent disconnecti...
Kam-yiu Lam, Tei-Wei Kuo
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
15 years 9 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
78
Voted
JCIT
2010
131views more  JCIT 2010»
14 years 4 months ago
A Secure Routing Protocol for Peer-to-Peer Network
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
Xu Xiang, Jianguo Chen
63
Voted
SPW
2004
Springer
15 years 3 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
79
Voted
RFIDSEC
2010
14 years 8 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...