Sciweavers

1801 search results - page 268 / 361
» Implementation-Oriented Secure Architectures
Sort
View
135
Voted
WISEC
2010
ACM
15 years 10 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
125
Voted
WISEC
2010
ACM
15 years 10 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
WISEC
2010
ACM
15 years 10 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
154
Voted
ICDS
2009
IEEE
15 years 10 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
IEEEARES
2009
IEEE
15 years 10 months ago
A Framework for Understanding Botnets
Botnets have become a severe threat to the cyberspace. However, existing studies are typically conducted in an ad hoc fashion, by demonstrating specific analysis on captured bot ...
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu