Obstruction 发表于 2025-3-25 05:24:54

http://reply.papertrans.cn/87/8634/863313/863313_21.png

键琴 发表于 2025-3-25 07:47:53

Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networkshe end-to-end argument which guided much of the Internet design, in network security. We conclude with a common theme of current research in security of emergent properties, namely that of a new threat model whereby the adversary may adaptively compromise nodes of a network.

柱廊 发表于 2025-3-25 11:56:12

http://reply.papertrans.cn/87/8634/863313/863313_23.png

来就得意 发表于 2025-3-25 18:43:20

http://reply.papertrans.cn/87/8634/863313/863313_24.png

山羊 发表于 2025-3-25 22:41:15

http://reply.papertrans.cn/87/8634/863313/863313_25.png

Tincture 发表于 2025-3-26 03:28:47

A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Networksources like limited battery power, memory, processing capabilities etc. These Limitations make infeasible to apply traditional key management techniques such as public key cryptography or other complex cryptographic techniques in the USN. Based on polynomial key pre-distribution protocol, we propos

完全 发表于 2025-3-26 07:57:25

http://reply.papertrans.cn/87/8634/863313/863313_27.png

反复拉紧 发表于 2025-3-26 08:48:16

Server-Aided RSA Key Generation Against Collusion Attackcols, however, is that they cannot prevent a “collusion attack” in which two key generation servers communicate with each other to get useful information about the user’s private key. In this paper, we present two new server-aided RSA key generation protocols secure against such an attack. In additi

迫击炮 发表于 2025-3-26 14:49:29

Hybrid Approach for Secure Mobile Agent Computationsschemes where cryptographic protocols are utilized. We review and analyze methods proposed for securing agent operations in the face of passive and active adversaries by means of secure multi-party computations. We examine the strengths and weaknesses of such techniques and pose hybrid schemes which

Nonflammable 发表于 2025-3-26 16:49:49

An XML Standards Based Authorization Framework for Mobile Agents authorization framework for mobile agents. The system takes as a base distributed RBAC policies allowing the discretionary delegation of authorizations. A solution is provided to assign authorizations to mobile agents in a safe manner. Mobile agents do not need to carry sensitive information such a
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Secure Mobile Ad-hoc Networks and Sensors; First International Mike Burmester,Alec Yasinsac Conference proceedings 2006 Springer-Verlag Be