Sciweavers

1653 search results - page 160 / 331
» Timed analysis of security protocols
Sort
View
138
Voted
SASN
2003
ACM
15 years 8 months ago
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
We present a security design for a general purpose, selforganizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. ...
Thomas S. Messerges, Johnas Cukier, Tom A. M. Keve...
114
Voted
LCN
1999
IEEE
15 years 7 months ago
Time Series Models for Internet Data Traffic
A statistical analysis of Internet traffic measurements from a campus site is carried out to examine the influence of the constituent protocols and applications on the characteris...
Chun You, Kavitha Chandra
121
Voted
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 10 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
155
Voted
ALGOSENSORS
2007
Springer
15 years 9 months ago
Asynchronous Training in Wireless Sensor Networks
Scalable energy-efficient training protocols are proposed for massively-deployed sensor networks, where sensors are initially anonymous and unaware of their location. The protocol...
Ferruccio Barsi, Alan A. Bertossi, Francesco Betti...
102
Voted
WWW
2004
ACM
16 years 4 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...