Sciweavers

360 search results - page 23 / 72
» Information Security on the Logistical Network: An End-to-En...
Sort
View
ADHOCNOW
2007
Springer
14 years 2 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
IEEEARES
2007
IEEE
14 years 2 months ago
Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network
The issue of information security has attracted increasing attention in recent years. In network attack and defense scenarios, attackers and defenders constantly change their resp...
Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin
ESORICS
2000
Springer
14 years 19 hour ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
CMS
1996
167views Communications» more  CMS 1996»
13 years 9 months ago
Anonymous Mobility Management for Third Generation Mobile Networks
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mob...
Simon Hoff, Kai Jakobs, Dogan Kesdogan
WWW
2007
ACM
14 years 9 months ago
Cantina: a content-based approach to detecting phishing web sites
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, ...
Jason I. Hong, Lorrie Faith Cranor, Yue Zhang 0002