Sciweavers

2358 search results - page 155 / 472
» A Secure Pervasive Environment
Sort
View
JERIC
2006
68views more  JERIC 2006»
13 years 9 months ago
Teaching context in information security
: This paper discusses teaching the application of technical idea through non-technical discussions, especially the use of puzzles to engage students. After discussing the need for...
Matt Bishop
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
14 years 2 months ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee
ICDCS
2011
IEEE
12 years 8 months ago
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks
—Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desi...
Rui Zhang 0007, Yanchao Zhang
MAS
1998
Springer
145views Communications» more  MAS 1998»
14 years 1 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
ICONS
2009
IEEE
14 years 3 months ago
Ontology-Based Decision Support for Information Security Risk Management
—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer