Sciweavers

5891 search results - page 127 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ADHOCNOW
2004
Springer
15 years 7 months ago
Energy-Memory-Security Tradeoffs in Distributed Sensor Networks
David Hwang, Bo-Cheng Lai, Ingrid Verbauwhede
IJSNET
2008
118views more  IJSNET 2008»
15 years 1 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
CN
2006
66views more  CN 2006»
15 years 1 months ago
Secure acknowledgment aggregation and multisignatures with limited robustness
In certain reliable group-oriented and multicast applications, a source needs to securely verify whether all (and if not all, which) intended receivers have received a message. How...
Claude Castelluccia, Stanislaw Jarecki, Jihye Kim,...
SUTC
2008
IEEE
15 years 8 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
HCW
2000
IEEE
15 years 6 months ago
Heterogeneity as Key Feature of High Performance Computing: the PQE1 Prototype
In this work we present the results of a project aimed at assembling an hybrid massively parallel machine, the PQE1 prototype, devoted to the simulation of complex physical models...
Paolo Palazzari, Lidia Arcipiani, Massimo Celino, ...