Sciweavers

6907 search results - page 365 / 1382
» Securing distributed adaptation
Sort
View
ICDCSW
2007
IEEE
15 years 11 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
ITNG
2007
IEEE
15 years 11 months ago
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...
143
Voted
ECWEB
2003
Springer
93views ECommerce» more  ECWEB 2003»
15 years 10 months ago
A Secure Electronic Payment Scheme for Charity Donations
Although many charities have a web presence, almost all of them have been designed to accept credit cards as the only means for making donations. The anonymity requirements of many...
Mansour A. Al-Meaither, Chris J. Mitchell
140
Voted
EUROCRYPT
1998
Springer
15 years 9 months ago
Quorum-Based Secure Multi-party Computation
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Donald Beaver, Avishai Wool
199
Voted
IADIS
2004
15 years 6 months ago
Enhancing WLAN Security by Introducing EAP-TLS Smartcards
Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...
Mohamad Badra, Pascal Urien