Sciweavers

5386 search results - page 43 / 1078
» Approaches to Multimedia and Security
Sort
View
COMSIS
2006
100views more  COMSIS 2006»
13 years 10 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
ISSE
2006
13 years 10 months ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
MOR
2010
102views more  MOR 2010»
13 years 4 months ago
A Unified Approach to Box-Mengerian Hypergraphs
Xujin Chen, Zhibin Chen, Wenan Zang
ECUMN
2007
Springer
14 years 4 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius