Sciweavers

55 search results - page 8 / 11
» Addressing the Problem of Undetected Signature Key Compromis...
Sort
View
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 9 months ago
Fa: A System for Automating Failure Diagnosis
Abstract-Failures of Internet services and enterprise systems lead to user dissatisfaction and considerable loss of revenue. Since manual diagnosis is often laborious and slow, the...
Songyun Duan, Shivnath Babu, Kamesh Munagala
CSFW
2007
IEEE
14 years 1 months ago
Reasoning about Concurrency for Security Tunnels
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Alwyn Goodloe, Carl A. Gunter
INFOCOM
2007
IEEE
14 years 1 months ago
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
—The demand for efficient data dissemination/access techniques to find the relevant data from within a sensor network has led to the development of data-centric sensor networks...
Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
13 years 2 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
13 years 12 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon