Sciweavers

3349 search results - page 141 / 670
» Data Security
Sort
View
IPOM
2009
Springer
15 years 10 months ago
Security Considerations for Intrinsic Monitoring within IPv6 Networks
Abstract. Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrie...
Lei Shi, Alan Davy
136
Voted
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
15 years 9 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...
132
Voted
FCCM
2004
IEEE
101views VLSI» more  FCCM 2004»
15 years 7 months ago
Secure Remote Control of Field-programmable Network Devices
A circuit and an associated lightweight protocol have been developed to secure communication between a control console and remote programmable network devices1 . The circuit provi...
Haoyu Song, Jing Lu, John W. Lockwood, James Mosco...
151
Voted
PE
2002
Springer
158views Optimization» more  PE 2002»
15 years 3 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
141
Voted
EUROSYS
2008
ACM
16 years 20 days ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...