Sciweavers

947 search results - page 65 / 190
» Provable Implementations of Security Protocols
Sort
View
PODC
2004
ACM
15 years 5 months ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
PLDI
1998
ACM
15 years 4 months ago
The Implementation of the Cilk-5 Multithreaded Language
The fth release of the multithreaded language Cilk uses a provably good \work-stealing" scheduling algorithm similar to the rst system, but the language has been completely r...
Matteo Frigo, Charles E. Leiserson, Keith H. Randa...
WISA
2009
Springer
15 years 6 months ago
Securing Remote Access Inside Wireless Mesh Networks
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Mark Manulis
INFOCOM
2008
IEEE
15 years 6 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
EUROPKI
2008
Springer
15 years 1 months ago
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present ...
Bart De Decker, Mohamed Layouni, Hans Vangheluwe, ...