Sciweavers

5484 search results - page 162 / 1097
» Almost-Everywhere Secure Computation
Sort
View
PERVASIVE
2008
Springer
15 years 4 months ago
Security and Privacy for Implantable Medical Devices
Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin F...
RAID
2010
Springer
15 years 2 months ago
A Centralized Monitoring Infrastructure for Improving DNS Security
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto...
CLOUDCOM
2010
Springer
15 years 2 months ago
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning
Yuri Demchenko, Cees de Laat, Diego R. Lopez, Joan...
COMCOM
2011
14 years 11 months ago
An RFID secure authentication mechanism in WLAN
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...
WS
2006
ACM
15 years 10 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla