We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
The perceived lack of security in the wireless environment has delayed many initiatives in providing access to ecommerce applications from wireless devices. Many organizations are...
Large scale penetration of digital technologies led them to join roads, electricity, and water distribution, as essential infrastructures of modernity. “Digital convergence” r...
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infra...