Sciweavers

688 search results - page 82 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
ATAL
2003
Springer
15 years 8 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
CCGRID
2011
IEEE
14 years 8 months ago
GeoServ: A Distributed Urban Sensing Platform
—Urban sensing where mobile users continuously gather, process, and share location-sensitive sensor data (e.g., street images, road condition, traffic flow) is emerging as a ne...
Jong Hoon Ahnn, Uichin Lee, Hyun Jin Moon
JCS
2006
116views more  JCS 2006»
15 years 4 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
FTDCS
2003
IEEE
15 years 10 months ago
Service Provisioning and Management in Virtual Private Active Networks
Service providers have been motivated to develop and offer new services to their customers. The key question is what kind of futuristic and practical services customers need. This...
Fábio Luciano Verdi, Edmundo R. M. Madeira