Sciweavers

1627 search results - page 83 / 326
» High Security Smartcards
Sort
View
141
Voted
VIZSEC
2007
Springer
15 years 10 months ago
Visualization of Host Behavior for Network Security
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
F. Mansman, L. Meier, Daniel A. Keim
EEE
2005
IEEE
15 years 9 months ago
Service Composition in a Secure Agent-Based Architecture
We describe an agent-based situation-aware survivable architecture for the discovery and composition of web services. Our architecture provides for proofs that guaranteethe consis...
Ramesh Bharadwaj, Supratik Mukhopadhyay, Nilay Pad...
138
Voted
EUROMICRO
1999
IEEE
15 years 8 months ago
JFS: A Secure Distributed File System for Network Computers
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the co...
Marcus O'Connell, Paddy Nixon
FCCM
2004
IEEE
101views VLSI» more  FCCM 2004»
15 years 7 months ago
Secure Remote Control of Field-programmable Network Devices
A circuit and an associated lightweight protocol have been developed to secure communication between a control console and remote programmable network devices1 . The circuit provi...
Haoyu Song, Jing Lu, John W. Lockwood, James Mosco...
USENIX
2007
15 years 6 months ago
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication
In many environments, a computer system is severely constrained to the extent that the practical input mechanisms are merely binary switches. Requiring the user to remember a long...
Umut Topkara, Mercan Topkara, Mikhail J. Atallah