Sciweavers

3149 search results - page 110 / 630
» IT security risk management
Sort
View
CORR
2011
Springer
189views Education» more  CORR 2011»
13 years 4 months ago
Secure Routing in Wireless Mesh Networks
— This paper introduces Policy based Management Information Base to mange danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management fun...
Jaydip Sen
IEEEIAS
2009
IEEE
14 years 3 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
CN
2002
87views more  CN 2002»
13 years 9 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
AINA
2007
IEEE
13 years 11 months ago
Secure Mobile Ad hoc Routing
In mobile ad hoc networks (MANETs), multi-hop message relay is the common way for nodes to communicate and participate in network operations, making routing a primary issue. The e...
Xu Li, Amiya Nayak, Isabelle Ryl, David Simplot, I...
EEE
2005
IEEE
14 years 2 months ago
E-Voting: A Scalable Approach using XML and Hardware Security Modules
Thomas Rössler, Herbert Leitold, Reinhard Pos...