Sciweavers

3451 search results - page 571 / 691
» Collaborative attack modeling
Sort
View
CCS
2009
ACM
14 years 3 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
PERVASIVE
2009
Springer
14 years 3 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
GLOBECOM
2009
IEEE
14 years 3 months ago
Human Behavior and Challenges of Anonymizing WLAN Traces
—With the wide spread deployment of wireless LANs (WLANs), it is becoming necessary to conduct analysis of libraries of measurements taken from such operational networks. The ava...
Udayan Kumar, Ahmed Helmy
INFOCOM
2009
IEEE
14 years 3 months ago
Diverse Routing in Networks with Probabilistic Failures
—We develop diverse routing schemes for dealing with multiple, possibly correlated, failures. While disjoint path protection can effectively deal with isolated single link failur...
Hyang-Won Lee, Eytan Modiano
WINE
2009
Springer
111views Economy» more  WINE 2009»
14 years 3 months ago
Prediction Mechanisms That Do Not Incentivize Undesirable Actions
A potential downside of prediction markets is that they may incentivize agents to take undesirable actions in the real world. For example, a prediction market for whether a terrori...
Peng Shi, Vincent Conitzer, Mingyu Guo