Security in distributed and networking systems

Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes Cover-Free Families, Key Distribution Patterns and Their Applications in Network Security Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services Secure Network Programming for Distributed Sensor Networks Security Optimization in Real-Time Systems Threshold Cryptography in Distributed Systems Security Risks in Multi-Agent Systems Security in Service Discovery and Provision in Ad Hoc Networks Security in Web-Based Networking A Taxonomy of Attacks and Defense Mechanisms in Wireless Embedded Systems Securing Wireless Networks Using Device Type Identification Attacks and Countermeasures in Ad Hoc Routing Access Control Policy Negotiation for Remote Hot-deployed Grid Services and other papers.

[1]  Dean G. Blevins,et al.  Introduction 11-1 , 1969 .