Sciweavers

3504 search results - page 34 / 701
» Secure protocol composition
Sort
View
TMC
2012
13 years 2 days ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
96
Voted
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
15 years 4 months ago
Security Conscious Web Service Composition with Semantic Web Support
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Recently, there has been a growing interest in Web ...
Barbara Carminati, Elena Ferrari, Ryan Bishop, Pat...
57
Voted
SPW
2004
Springer
15 years 3 months ago
Toward a Broader View of Security Protocols
Matt Blaze
ESORICS
2012
Springer
13 years 1 days ago
Formal Analysis of Privacy in an eHealth Protocol
Given the sensitive nature of health data, privacy of eHealth systems is of prime importance. An eHealth system must enforce that users remain private, even if they are bribed or c...
Naipeng Dong, Hugo Jonker, Jun Pang