Sciweavers

2517 search results - page 228 / 504
» Secure Deployment of Components
Sort
View
IWDC
2005
Springer
128views Communications» more  IWDC 2005»
15 years 10 months ago
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment conï...
Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatr...
CAISE
2003
Springer
15 years 9 months ago
User Roles in Document Analysis
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
Pasi Tiitinen
DEXAW
2002
IEEE
97views Database» more  DEXAW 2002»
15 years 9 months ago
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
Yan Wang 0002, Kian-Lee Tan, Xiaolin Pang
NORDSEC
2009
Springer
15 years 9 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
DFN
2003
15 years 5 months ago
Virtual Private Networks Coping with Complexity
: Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authe...
Andreas Steffen