ACM Conference on Computer and Communications SecurityAssociation for Computing Machinery, 2002 |
Inhalt
Paulson University of Cambridge | 21 |
Key Management and Key Exchange | 31 |
A KeyManagement Scheme for Distributed Sensor Networks | 41 |
Urheberrecht | |
14 weitere Abschnitte werden nicht angezeigt.
Andere Ausgaben - Alle anzeigen
Häufige Begriffe und Wortgruppen
access control adversary alerts algorithm analysis anonymity approach asynchronous attack authentication authorization bits checksum ciphertext Code Red Code Red worm Computer controlled operations copies correlation correspondent node cost credential cryptographic cryptosystems decryption defined denial-of-service attacks Diffie-Hellman digital rights management digital signature distributed encoding encryption scheme exploit Figure function Gnutella graph hash HMAC honest servers hosts hyper-alert ID.d identify identity IETF implementation initiator input Internet intrusion detection IP address IPsec IPv6 malicious node mix server mobile node multiple nonce output packets parameters password path Payment Gateway phase polynomial Proc proof properties protocol public key public key certificates queries random requires responder router routing secret Section sensor servents sharing signature specific subnet system call Tarzan tion topology traffic tunnel v₁ verifiable secret sharing verify worm