Sciweavers

677 search results - page 53 / 136
» Secure Pseudonymous Channels
Sort
View
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 6 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
AWCC
2004
Springer
15 years 5 months ago
Securing Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...
ACSAC
2004
IEEE
15 years 3 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
ICC
2009
IEEE
134views Communications» more  ICC 2009»
15 years 6 months ago
Short-Length Raptor Codes for Mobile Free-Space Optical Channels
Abstract—Free-space optical (FSO) links are competitive wireless links offering high data rate, security and low system complexity. For mobile applications, e.g., from a ground b...
Wenzhe Zhang, Steve Hranilovic
ICC
2009
IEEE
130views Communications» more  ICC 2009»
14 years 9 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...