Sciweavers

1663 search results - page 62 / 333
» Computer Security in the Real World
Sort
View
ENTCS
2008
390views more  ENTCS 2008»
13 years 7 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 2 months ago
XML Security Using XSLT
The eXtensible Markup Language (XML) is regarded generally as having promise of becoming established as the general purpose framework for enabling transfer of data amongst heterog...
R. G. Bartlett, M. W. Cook
LISA
2007
13 years 11 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
AAAI
2012
11 years 11 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe
WOA
2007
13 years 10 months ago
Agents and Security in a Cultural Assets Transport Scenario
Abstract— Museums and exhibitions represent a relevant contribution to the economy all over the world. In Italy, in the year 2006 the 400 national museums, monuments and archaeol...
Stefania Costantini, Arianna Tocchio, Panagiota Ts...