Sciweavers

2951 search results - page 378 / 591
» Secure Distributed DNS
Sort
View
140
Voted
COMPSAC
2005
IEEE
15 years 10 months ago
Situation-Awareness for Adaptive Coordination in Service-Based Systems
Service-based systems have many applications, including collaborative research and development, ebusiness, health care, environmental control, military applications, and homeland ...
Stephen S. Yau, Dazhi Huang, Haishan Gong, Hasan D...
141
Voted
ICPADS
2005
IEEE
15 years 10 months ago
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups
In this paper we propose an efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations...
Mark Manulis
GCC
2005
Springer
15 years 10 months ago
A Worm Behavioral Approach to Susceptible Host Detection
A new detection approach based on worm behaviors for IDS anti-worm is presented. By the method, the susceptible hosts probed by worms can be detected, and then an immediate counter...
BaiLing Wang, Binxing Fang, Xiao-chun Yun
MIDDLEWARE
2004
Springer
15 years 10 months ago
Environment mobility: moving the desktop around
In this position paper, we focus on issues related to middleware support for software mobility in ad hoc and pervasive systems. In particular, we are interested in moving the comp...
Dag Johansen, Håvard D. Johansen, Robbert va...
PKC
2004
Springer
146views Cryptology» more  PKC 2004»
15 years 10 months ago
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
Abstract. In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construc...
Huafei Zhu