Sciweavers

1058 search results - page 104 / 212
» Secure Group Communications Using Key Graphs
Sort
View
CCS
2011
ACM
14 years 2 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
108
Voted
USENIX
2003
15 years 3 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
134
Voted
ESWS
2009
Springer
15 years 9 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller
128
Voted
NETWORKING
2004
15 years 3 months ago
On Dynamic Subset Difference Revocation Scheme
Subset Difference Revocation (SDR) [8] has been proposed to perform group rekeying in a stateless manner. However, statelessness comes at a cost in terms of storage and message ove...
Weifeng Chen, Zihui Ge, Chun Zhang, James F. Kuros...
105
Voted
PERVASIVE
2004
Springer
15 years 8 months ago
ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing
Abstract. This paper describesa method for establishing ad hoc and infrastructuremode wireless network connections based on physical proximity. Users can easily establish secure wi...
Jun Rekimoto, Takashi Miyaki, Michimune Kohno