Sciweavers

2139 search results - page 165 / 428
» Distributed computing and computer security education
Sort
View
ICNP
2009
IEEE
15 years 10 months ago
Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks
—Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, ...
Alexander W. Min, Kang G. Shin, Xin Hu
NSPW
2003
ACM
15 years 8 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
CONCUR
2005
Springer
15 years 8 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
CSFW
1992
IEEE
15 years 7 months ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
PLDI
2006
ACM
15 years 9 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka