Sciweavers

5324 search results - page 211 / 1065
» Internet Security Protocols
Sort
View
JNCA
2010
85views more  JNCA 2010»
14 years 11 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
ICASSP
2011
IEEE
14 years 8 months ago
Efficient protocols for secure adaptive filtering
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
ICDCIT
2005
Springer
15 years 10 months ago
Validation of Policy Integration Using Alloy
Abstract. Organizations typically have multiple security policies operating together in the same system. The integration of multiple policies might be needed to achieve the desired...
Manachai Toahchoodee, Indrakshi Ray
CN
2004
122views more  CN 2004»
15 years 4 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
WPES
2005
ACM
15 years 10 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk