Sciweavers

2403 search results - page 413 / 481
» Cyberinsurance in IT Security Management
Sort
View
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 8 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
CN
2007
172views more  CN 2007»
13 years 8 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
PUC
2006
72views more  PUC 2006»
13 years 8 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
CHI
2011
ACM
12 years 11 months ago
Home automation in the wild: challenges and opportunities
Visions of smart homes have long caught the attention of researchers and considerable effort has been put toward enabling home automation. However, these technologies have not bee...
A. J. Bernheim Brush, Bongshin Lee, Ratul Mahajan,...
IWAN
1999
Springer
14 years 12 days ago
The Impact of Active Networks on Established Network Operators
A collaborative case based study has established that Active Networks will have a very significant impact on Network operators. Active Networking appears to be the only route to a...
Arto Juhola, Ian Marshall, Stefan Covaci, Thomas V...