Sciweavers

5484 search results - page 1018 / 1097
» Almost-Everywhere Secure Computation
Sort
View
CORR
2006
Springer
77views Education» more  CORR 2006»
14 years 12 months ago
Prioritizing Software Inspection Results using Static Profiling
Static software checking tools are useful as an additional automated software inspection step that can easily be integrated in the development cycle and assist in creating secure,...
Cathal Boogerd, Leon Moonen
IJACT
2008
136views more  IJACT 2008»
14 years 12 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
IJNSEC
2008
175views more  IJNSEC 2008»
14 years 12 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das
IJNSEC
2008
135views more  IJNSEC 2008»
14 years 12 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
IJNSEC
2008
132views more  IJNSEC 2008»
14 years 12 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
« Prev « First page 1018 / 1097 Last » Next »