Sciweavers

947 search results - page 151 / 190
» HMM-Based Trust Model
Sort
View
WIMOB
2008
IEEE
15 years 11 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 11 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
EUROCRYPT
2005
Springer
15 years 10 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
136
Voted
ESOP
2003
Springer
15 years 10 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
ICWS
2009
IEEE
16 years 2 months ago
A Policy-Based Middleware for Web Services SLA Negotiation
Negotiation of Service Level Agreements (SLAs) is very important for maintaining Quality of Service (QoS) of composite Web services-based business processes. The process of negoti...
Farhana H. Zulkernine, Patrick Martin, Chris Cradd...