Sciweavers

859 search results - page 45 / 172
» Security for Key Management Interfaces
Sort
View
MOBIHOC
2007
ACM
15 years 11 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
ADHOC
2005
125views more  ADHOC 2005»
14 years 11 months ago
Security considerations in ad hoc sensor networks
In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena. As sensor networks c...
Fei Hu, Neeraj K. Sharma
ADVIS
2004
Springer
15 years 5 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan
ACSAC
2005
IEEE
15 years 5 months ago
Uniform Application-level Access Control Enforcement of Organizationwide Policies
Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...
CADUI
2004
15 years 1 months ago
A Lightweight Experiment Management System for Handheld Computers
: This paper describes a system that helps HCI practitioners and researchers manage and conduct experiments involving context-sensitive handheld applications, particularly related ...
Philip D. Gray, Joy Goodman, James Macleod