Sciweavers

6907 search results - page 177 / 1382
» Securing distributed adaptation
Sort
View
74
Voted
IFIP
2009
Springer
15 years 4 months ago
Specifying and Modelling Secure Channels in Strand Spaces
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol ed on top of a secure transport protocol. The model abst...
Allaa Kamil, Gavin Lowe
ESAS
2005
Springer
15 years 3 months ago
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
Gergely Ács, Levente Buttyán, Istv&a...
53
Voted
NSPW
2003
ACM
15 years 3 months ago
Towards a new paradigm for securing wireless sensor networks
K. Jones, Ashraf Wadaa, Stephan Olariu, Larry Wils...
86
Voted
NSPW
2004
ACM
15 years 3 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
GCC
2003
Springer
15 years 3 months ago
Study on a Secure Access Model for the Grid Catalogue
To solve the security of access to meta-data in computational Grids, by modifying model BLP, a secure access model named GBLP is introduced to support access control to Grid catalo...
Bing Xie, Xiaolin Gui, Qingjiang Wang