Sciweavers

349 search results - page 36 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
SASN
2006
ACM
14 years 2 months ago
Seven cardinal properties of sensor network broadcast authentication
We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, su...
Mark Luk, Adrian Perrig, Bram Whillock
CONEXT
2006
ACM
14 years 2 months ago
SNARE: sensor node attached reputation evaluator
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. The motivation for tackling this problem comes directly from the...
Ismat K. Maarouf, A. R. Naseer
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
14 years 1 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...
SAC
2006
ACM
14 years 2 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
GG
2004
Springer
14 years 2 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu