Sciweavers

5484 search results - page 192 / 1097
» Almost-Everywhere Secure Computation
Sort
View
EUC
2005
Springer
15 years 10 months ago
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code
Jianyong Huang, Jennifer Seberry, Willy Susilo, Ma...
ADHOCNOW
2004
Springer
15 years 10 months ago
Energy-Memory-Security Tradeoffs in Distributed Sensor Networks
David Hwang, Bo-Cheng Lai, Ingrid Verbauwhede
NSPW
2003
ACM
15 years 9 months ago
Towards a new paradigm for securing wireless sensor networks
K. Jones, Ashraf Wadaa, Stephan Olariu, Larry Wils...
IEEESP
2010
92views more  IEEESP 2010»
15 years 1 months ago
Ethics in Security Vulnerability Research
Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis...
130
Voted
IEEEIAS
2008
IEEE
15 years 11 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell