Sciweavers

1116 search results - page 69 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
110
Voted
IFIP
2010
Springer
14 years 7 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
105
Voted
DLOG
2006
15 years 2 months ago
Static Knowledge Representation of Multi-Agent System's Specification by Description Logic
Modularity and rigor are two key elements for multi-agent technology. Hong Zhu's multi-agent system (MAS) development method provides proper language facilities supporting mo...
Haiyan Che, Jigui Sun
IEEECIT
2010
IEEE
14 years 11 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
123
Voted
SUTC
2006
IEEE
15 years 6 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
101
Voted
STOC
2005
ACM
112views Algorithms» more  STOC 2005»
16 years 27 days ago
The complexity of agreement
A celebrated 1976 theorem of Aumann asserts that honest, rational Bayesian agents with common priors will never "agree to disagree": if their opinions about any topic ar...
Scott Aaronson