Sciweavers

400 search results - page 43 / 80
» Cryptography and computer security for undergraduates
Sort
View
SP
1990
IEEE
15 years 2 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
ISW
2007
Springer
15 years 4 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
SASN
2003
ACM
15 years 3 months ago
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
We present a security design for a general purpose, selforganizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. ...
Thomas S. Messerges, Johnas Cukier, Tom A. M. Keve...
ICNP
2003
IEEE
15 years 3 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
DEBS
2010
ACM
14 years 10 months ago
Providing basic security mechanisms in broker-less publish/subscribe systems
The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publi...
Muhammad Adnan Tariq, Boris Koldehofe, Ala' Altawe...