Sciweavers

3751 search results - page 197 / 751
» Events in security protocols
Sort
View
FDL
2004
IEEE
15 years 8 months ago
UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems
In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IP...
Mauro Prevostini, Giuseppe Piscopo, I. Stefanini
ISEM
2007
81views more  ISEM 2007»
15 years 4 months ago
Interimistic data dissemination
Abstract We present low-overhead protocols for disseminating streaming data in an interimistic environment in which the availability of computers, networks, and other resources is ...
Sudarshan S. Chawathe, Abheek Anand
GLOBECOM
2007
IEEE
15 years 10 months ago
LOFT: A Latency-Oriented Fault Tolerant Transport Protocol for Wireless Sensor-Actuator Networks
— Wireless sensor-actuator networks, or WSANs, refer to a group of sensors and actuators which collect data from the environment and perform application-specific actions in resp...
Edith C. H. Ngai, Yangfan Zhou, Michael R. Lyu, Ji...
ICPPW
2003
IEEE
15 years 9 months ago
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network
The mobile ad hoc network (MANET), which is characterized by an infrastructureless architecture and multi-hop communication, has attracted a lot of attention recently. In the evol...
Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee
EUROCRYPT
2007
Springer
15 years 8 months ago
Round-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
Jonathan Katz, Chiu-Yuen Koo