Sciweavers

6907 search results - page 19 / 1382
» Securing distributed adaptation
Sort
View
CCS
1993
ACM
15 years 1 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
78
Voted
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 1 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
CORR
2010
Springer
158views Education» more  CORR 2010»
14 years 8 months ago
Clustered Hierarchy in Sensor Networks: Performance and Security
Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from...
Mohammed Abuhelaleh, Khaled M. Elleithy, Thabet M....
RTCSA
2006
IEEE
15 years 3 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son