Sciweavers

191 search results - page 16 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Improved Port Knocking with Strong Authentication
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an au...
Rennie deGraaf, John Aycock, Michael J. Jacobson J...
ESAW
2003
Springer
14 years 1 months ago
A Liberal Approach to Openness in Societies of Agents.
We outline a model for a society of agents based upon one of the classical theories of sociology: The Weber’s model. We first investigate its links to agent technology through i...
Jacques Calmet, Anusch Daemi, Regine Endsuleit, Th...
CIIA
2009
13 years 9 months ago
A Study on the Convergence of FingerHashing and a Secured Biometric System
Because biometrics-based authentication offers several advantages face to other authentication methods, it is important that such systems be designed to withstand attacks. Reliabil...
Rima Belguechi, Christophe Rosenberger
INFOCOM
2008
IEEE
14 years 3 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
CCGRID
2005
IEEE
14 years 2 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif