Sciweavers

832 search results - page 119 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
ICALP
2009
Springer
15 years 11 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
CORR
2008
Springer
187views Education» more  CORR 2008»
14 years 11 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
DEXAW
2005
IEEE
151views Database» more  DEXAW 2005»
15 years 4 months ago
An Overlay Network for Resource Discovery in Grids
As Grids try to achieve optimal and balanced utilization of unused resources in a distributed system, fast and efficient discovery of resource states is a key requirement. For sm...
Manfred Hauswirth, Roman Schmidt
CN
2002
87views more  CN 2002»
14 years 11 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
PODC
2010
ACM
15 years 3 months ago
Brief announcement: improving social-network-based sybil-resilient node admission control
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiti...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...