Sciweavers

4330 search results - page 87 / 866
» Analyzing security architectures
Sort
View
P2P
2008
IEEE
138views Communications» more  P2P 2008»
15 years 11 months ago
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance
We present a content delivery infrastructure distributing and maintaining software packages in a large organization. Our work based on a trace-based analysis of an existing softwa...
Purvi Shah, Jehan-François Pâris, Jef...
150
Voted
WIMOB
2008
IEEE
15 years 11 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
IEEEIAS
2007
IEEE
15 years 11 months ago
Analysing the Security Threats against Network Convergence Architectures
Patroklos G. Argyroudis, Robert McAdoo, Stephen To...
ISCA
2007
IEEE
109views Hardware» more  ISCA 2007»
15 years 11 months ago
Raksha: a flexible information flow architecture for software security
Michael Dalton, Hari Kannan, Christos Kozyrakis