Sciweavers

828 search results - page 144 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
DSN
2003
IEEE
15 years 7 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
140
Voted
TPHOL
2009
IEEE
15 years 9 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
WETICE
1998
IEEE
15 years 6 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
JUCS
2006
166views more  JUCS 2006»
15 years 2 months ago
CAMMD: Context-Aware Mobile Medical Devices
: Telemedicine applications on a medical practitioner's mobile device should be context-aware. This can vastly improve the effectiveness of mobile applications and is a step t...
Timothy O'Sullivan, John O'Donoghue, John Herbert,...
121
Voted
RTCSA
2006
IEEE
15 years 8 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son