Sciweavers

6844 search results - page 1047 / 1369
» Web Service Security
Sort
View
GLOBECOM
2007
IEEE
15 years 11 months ago
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
Sungchul Heo, Zeen Kim, Kwangjo Kim
131
Voted
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 11 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
ICOIN
2007
Springer
15 years 11 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
ICMB
2005
IEEE
76views Business» more  ICMB 2005»
15 years 10 months ago
ZoneIT: Using Short-Range Radios to Control Mobile Device Functionality
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
Tim Moors, Marvyn Mei, Agus Salim
ISSADS
2005
Springer
15 years 10 months ago
Overview the Key Management in Ad Hoc Networks
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Gerardo del Valle, Roberto Gómez Cár...
« Prev « First page 1047 / 1369 Last » Next »