Sciweavers

2209 search results - page 112 / 442
» Language Based Secure Communication
Sort
View
154
Voted
SCN
2008
Springer
15 years 4 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...
IEEEARES
2006
IEEE
15 years 11 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
COLING
2008
15 years 6 months ago
Online-Monitoring of Security-Related Events
This paper presents a fully operational real-time event extraction system which is capable of accurately and efficiently extracting violent and natural disaster events from vast a...
Martin Atkinson, Jakub Piskorski, Bruno Pouliquen,...
ASPLOS
1998
ACM
15 years 9 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
15 years 11 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...