Sciweavers

4264 search results - page 53 / 853
» Provenance-aware secure networks
Sort
View
SCN
2008
Springer
147views Communications» more  SCN 2008»
14 years 9 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
WISTP
2009
Springer
15 years 4 months ago
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
Christian Lederer, Roland Mader, Manuel Koschuch, ...
EUROPKI
2007
Springer
15 years 3 months ago
Bootstrapping a Global SSO from Network Access Control Mechanisms
Manuel Sánchez, Gabriel López Mill&a...
AGENTS
2001
Springer
15 years 2 months ago
Distributed sensor network for real time tracking
ÁÒ Ø × Ô Ô Ö Û × Ö ÓÙÖ ×ÓÐÙØ ÓÒ ØÓ Ö Ð¹Ø Ñ ×¹ ØÖ ÙØ Ö ×ÓÙÖ ÐÐÓ Ø ÓÒ ÔÔÐ Ø ÓÒ ÒÚÓÐÚ Ò ×ØÖ ÙØ × ØÙ Ø ÓÒ ×× ××...
Bryan Horling, Régis Vincent, Roger Mailler...
SP
1998
IEEE
114views Security Privacy» more  SP 1998»
15 years 2 months ago
Detecting Disruptive Routers: A Distributed Network Monitoring Approach
Kirk A. Bradley, Steven Cheung, Nicholas J. Puketz...