Sciweavers

1058 search results - page 87 / 212
» Secure Group Communications Using Key Graphs
Sort
View
IJNSEC
2008
175views more  IJNSEC 2008»
15 years 2 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das
CSFW
2002
IEEE
15 years 7 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
HICSS
2008
IEEE
149views Biometrics» more  HICSS 2008»
15 years 9 months ago
Engaging E-Learning in Virtual Worlds: Supporting Group Collaboration
Current e-learning environments do not provide sufficient support for group collaboration. The absence of the visual identification of the users makes effective collaboration in e...
Katherine G. Franceschi, Ronald M. Lee, David Hind...
INFOCOM
2008
IEEE
15 years 8 months ago
A Scalable Method for Access Control in Location-Based Broadcast Services
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Li...
FASE
2009
Springer
15 years 9 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel