Sciweavers

154 search results - page 17 / 31
» Security Analysis of the MPLS Label Distribution Protocol
Sort
View
APBC
2003
123views Bioinformatics» more  APBC 2003»
14 years 11 months ago
A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data
In this paper we suggest the requirements for an open platform designed for the description, distribution and analysis of genetic polymorphism data. This platform is discussed in ...
Greg D. Tyrelle, Garry C. King
WISEC
2009
ACM
15 years 4 months ago
Towards a theory for securing time synchronization in wireless sensor networks
Time synchronization in highly distributed wireless systems like sensor and ad hoc networks is extremely important in order to maintain a consistent notion of time throughout the ...
Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, ...
SACMAT
2009
ACM
15 years 4 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
ICDCS
2002
IEEE
15 years 2 months ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...
73
Voted
CCS
2008
ACM
14 years 11 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi