Sciweavers

37 search results - page 5 / 8
» A Novel Utility and Game-Theoretic Based Security Mechanism ...
Sort
View
TCOS
2010
13 years 1 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
IEEEARES
2008
IEEE
14 years 1 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
SOUPS
2010
ACM
13 years 10 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
WICON
2008
13 years 8 months ago
Lightweight management of scalable and personalised media in mobile IPTV networks
In the present paper a novel system for scalable and personalised media management and its architecture is presented. The proposed solution is based on the creation of a secure an...
Laura Arnaiz, Lara García, Federico Alvarez...
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
14 years 8 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi