Sciweavers

977 search results - page 133 / 196
» Soft Constraints for Security
Sort
View
WPES
2006
ACM
15 years 3 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
15 years 4 months ago
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat again...
Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yar...
ICCS
2007
Springer
15 years 4 months ago
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
Tran Thanh Dai, Choong Seon Hong
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 4 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
IPCCC
2005
IEEE
15 years 3 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi