Sciweavers

1422 search results - page 219 / 285
» Information security and risk management
Sort
View
MSWIM
2006
ACM
14 years 2 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
STORAGESS
2006
ACM
14 years 2 months ago
Limiting trust in the storage stack
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on ...
Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea...
SASN
2005
ACM
14 years 2 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra
ISCIS
2003
Springer
14 years 2 months ago
Design of a Log Server for Distributed and Large-Scale Server Environments
Collection, storage and analysis of multiple hosts’ audit trails in a distributed manner are known as a major requirement, as well as a major challenge for enterprise-scale compu...
Attila Özgit, Burak Dayioglu, Erhan Anuk, Ina...
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
14 years 20 days ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop