Sciweavers

436 search results - page 63 / 88
» Using trust assumptions with security requirements
Sort
View
167
Voted
NDSS
2002
IEEE
15 years 8 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
153
Voted
SACMAT
2010
ACM
15 years 8 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
131
Voted
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
15 years 8 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
EUROSYS
2008
ACM
16 years 26 days ago
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide me...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
160
Voted
IJNSEC
2008
164views more  IJNSEC 2008»
15 years 3 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau