Sciweavers

5891 search results - page 95 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
75
Voted
EUROPAR
2008
Springer
15 years 3 months ago
Securing Real-Time On-Line Interactive Applications in edutain@grid
Justin Ferris, Mike Surridge, Frank Glinka
ESCIENCE
2005
IEEE
15 years 7 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
IEEEARES
2006
IEEE
15 years 7 months ago
Secure Enhanced Wireless Transfer Protocol
When IEEE 802.11i draft[1] proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage se...
Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang