Sciweavers

2504 search results - page 431 / 501
» Enterprise Security Architecture
Sort
View
GLOBECOM
2006
IEEE
15 years 6 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
ICSEA
2006
IEEE
15 years 6 months ago
Enforcing Interaction Properties in AOSD-Enabled Systems
The construction and maintenance of large and complex software systems depend on the existence of global principles describing the structure and the interaction among its various ...
Constantin Serban, Shmuel S. Tyszberowicz
ISCAS
2006
IEEE
108views Hardware» more  ISCAS 2006»
15 years 5 months ago
An optimal normal basis elliptic curve cryptoprocessor for inductive RFID application
In this paper a 173-bit type II ONB ECC processor Section II introduces the mathematical backgrounds for for inductive RFID applications is described. Compared with curve operation...
Pak-Keung Leung, Oliver Chiu-sing Choy, Cheong-fat...
ACNS
2006
Springer
78views Cryptology» more  ACNS 2006»
15 years 5 months ago
DSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the hig...
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Bl...
SAC
2006
ACM
15 years 5 months ago
STRUDEL: supporting trust in the dynamic establishment of peering coalitions
The Coalition Peering Domain (CPD) is a recent innovation within the field of mesh networking. It facilitates the management of community-area networks in a distributed and scala...
Daniele Quercia, Manish Lad, Stephen Hailes, Licia...