Sciweavers

3486 search results - page 529 / 698
» On the Design and Security of RC2
Sort
View
ENTCS
2008
136views more  ENTCS 2008»
14 years 11 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...
CN
2006
87views more  CN 2006»
14 years 11 months ago
Lightweight thread tunnelling in network applications
Abstract. Active Network nodes are increasingly being used for nontrivial processing of data streams. These complex network applications typically benefit from protection between t...
Austin Donnelly
COMCOM
2006
62views more  COMCOM 2006»
14 years 11 months ago
Self-monitoring of wireless sensor networks
This paper presents an efficient distributed self-monitoring mechanism for a class of wireless sensor networks used for monitoring and surveillance. In these applications, it is i...
Chih-fan Hsin, Mingyan Liu
IJNSEC
2008
85views more  IJNSEC 2008»
14 years 11 months ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
14 years 11 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu