Sciweavers

1769 search results - page 211 / 354
» Cryptography
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
110
Voted
SETA
2010
Springer
164views Mathematics» more  SETA 2010»
15 years 2 months ago
Synchronization of Boolean Dynamical Systems: A Spectral Characterization
Abstract. In this paper a spectral characterization of the synchronization property of Boolean dynamical systems is provided. Conditions on the spectrum of the next-state function ...
Jérémy Parriaux, Philippe Guillot, G...
MASS
2010
110views Communications» more  MASS 2010»
15 years 1 months ago
SpartanRPC: Secure WSN middleware for cooperating domains
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
Peter C. Chapin, Christian Skalka
PERCOM
2010
ACM
15 years 1 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
WISTP
2010
Springer
15 years 1 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel