Sciweavers

2403 search results - page 7 / 481
» Cyberinsurance in IT Security Management
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
CCS
2007
ACM
14 years 2 months ago
Security policy compliance with violation management
Julien Brunel, Frédéric Cuppens, Nor...
ISCC
2005
IEEE
14 years 1 months ago
Virtual Machine Management for Tele-Lab "IT-Security" Server
Tele-Lab “IT-Security” Server is a new concept for practical security education. The Tele-lab server builds a virtual security laboratory using lightweight virtual machines an...
Ji Hu, Dirk Cordel, Christoph Meinel
IDTRUST
2010
ACM
14 years 2 months ago
Biometrics-based identifiers for digital identity management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
IDTRUST
2009
ACM
14 years 2 months ago
Privacy-preserving management of transactions' receipts for mobile environments
Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer ...