Sciweavers

6907 search results - page 21 / 1382
» Securing distributed adaptation
Sort
View
ACISP
2001
Springer
15 years 2 months ago
On Classifying Conference Key Distribution Protocols
In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4...
Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Su...
WISTP
2007
Springer
15 years 3 months ago
Distributed Certified Information Access for Mobile Devices
Aniello Del Sorbo, Clemente Galdi, Giuseppe Persia...
CCS
2005
ACM
15 years 3 months ago
Risk assessment in distributed authorization
Peter C. Chapin, Christian Skalka, Xiaoyang Sean W...
AGENTS
2001
Springer
15 years 2 months ago
Mobile agents for monitoring distributed systems
Delbert Hart, Mihail Eduard Tudoreanu, Eileen Krae...
CCS
2001
ACM
15 years 2 months ago
Distributed credential chain discovery in trust management: extended abstract
Ninghui Li, William H. Winsborough, John C. Mitche...