Sciweavers

4264 search results - page 58 / 853
» Provenance-aware secure networks
Sort
View
NDSS
2000
IEEE
15 years 2 months ago
Secure Password-Based Cipher Suite for TLS
Peter Buhler, Thomas Eirich, Michael Waidner, Mich...
CAMAD
2006
IEEE
15 years 1 months ago
Three-tier satellite multicast security protocol based on ECMQV and IMC methods
Attila Altay Yavuz, Fatih Alagöz, Emin Anarim
ICDCSW
2000
IEEE
15 years 1 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
MOBISYS
2008
ACM
15 years 2 days ago
Virtualized in-cloud security services for mobile devices
Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, ...
ICDCSW
2005
IEEE
15 years 3 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt