Sciweavers

8655 search results - page 401 / 1731
» Challenges for Trusted Computing
Sort
View
138
Voted
DANCE
2002
IEEE
15 years 9 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...
NDSS
2002
IEEE
15 years 9 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
RAID
2001
Springer
15 years 8 months ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
SAC
2000
ACM
15 years 8 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...
CANDC
1999
ACM
15 years 8 months ago
A framework that supports collective creativity in design using visual images
The goal of our research is to develop computer systems that support designers’ collective creativity; such systems support individual creative aspects in design through the use...
Kumiyo Nakakoji, Yasuhiro Yamamoto, Masao Ohira