Sciweavers

4263 search results - page 647 / 853
» Network Security
Sort
View
DAC
1998
ACM
16 years 5 months ago
WELD - An Environment for Web-based Electronic Design
Increasing size and geographical separation of design data and teams has created a need for a network-based electronic design environment that is scaleable, adaptable, secure, hig...
Francis L. Chan, Mark D. Spiller, A. Richard Newto...
GLOBECOM
2007
IEEE
15 years 10 months ago
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
Sungchul Heo, Zeen Kim, Kwangjo Kim
ICDCSW
2007
IEEE
15 years 10 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
POLICY
2007
Springer
15 years 10 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
P2P
2006
IEEE
15 years 10 months ago
Route Fingerprinting in Anonymous Communications
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only ...
George Danezis, Richard Clayton