Sciweavers

1235 search results - page 97 / 247
» Formalizing information security knowledge
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 6 months ago
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
—In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In part...
Amitav Mukherjee, A. Lee Swindlehurst
EMISA
2004
Springer
14 years 1 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
IACR
2011
223views more  IACR 2011»
12 years 7 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
ICTAI
2008
IEEE
14 years 2 months ago
Integrating YAGO into the Suggested Upper Merged Ontology
Ontologies are becoming more and more popular as background knowledge for intelligent applications. Up to now, there has been a schism between manually assembled, highly axiomatic...
Gerard de Melo, Fabian M. Suchanek, Adam Pease