Sciweavers

1627 search results - page 135 / 326
» High Security Smartcards
Sort
View
GIL
2010
15 years 2 months ago
Light Competition in Chinese Cabbage/Maize Strip Intercropping Systems
: Due to drastic socio-economic changes traditional intercropping systems in China are endangered. New high yielding intercropping systems that can easily be mechanized have to be ...
Til Feike, Sebastian Munz, Simone Graeff-Hönn...
CCS
2007
ACM
15 years 10 months ago
Detecting covert timing channels: an entropy-based approach
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the ...
Steven Gianvecchio, Haining Wang
CCS
2007
ACM
15 years 10 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
WISTP
2007
Springer
15 years 10 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
CCGRID
2006
IEEE
15 years 10 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood