Sciweavers

4111 search results - page 45 / 823
» Security, Protocols, and Trust
Sort
View
94
Voted
ICPADS
2005
IEEE
15 years 6 months ago
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups
In this paper we propose an efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations...
Mark Manulis
IFIP
2010
Springer
14 years 7 months ago
Are BGP Routers Open to Attack? An Experiment
Abstract. The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been so...
Ludovico Cavedon, Christopher Kruegel, Giovanni Vi...
COMSUR
2000
202views more  COMSUR 2000»
15 years 11 days ago
A Survey of Trust in Internet Applications
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy i.e. who is authorised to perform action...
Tyrone Grandison, Morris Sloman
99
Voted
SOCIALCOM
2010
14 years 10 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
90
Voted
TRUST
2009
Springer
15 years 7 months ago
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Hans Löhr, Ahmad-Reza Sadeghi, Christian St&u...