Sciweavers

6555 search results - page 1054 / 1311
» Secure attribute-based systems
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
Wensheng Zhang, Nalin Subramanian, Guiling Wang
ISCAS
2008
IEEE
97views Hardware» more  ISCAS 2008»
15 years 10 months ago
Quality-aware GSM speech watermarking
—Use of watermarking techniques to provide authentication and tamper proofing of speech in mobile environment is becoming important. However, the current efforts do not allow for...
K. J.-L. Christabel, Sabu Emmanuel, Mohan S. Kanka...
SCAM
2008
IEEE
15 years 10 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
SRDS
2008
IEEE
15 years 10 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
AINA
2007
IEEE
15 years 10 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
« Prev « First page 1054 / 1311 Last » Next »