Sciweavers

5324 search results - page 39 / 1065
» Internet Security Protocols
Sort
View
DISCEX
2003
IEEE
14 years 28 days ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
ICICS
1997
Springer
13 years 11 months ago
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
INTERNET
2008
144views more  INTERNET 2008»
13 years 7 months ago
A Brief Introduction to Usable Security
Bryan D. Payne, W. Keith Edwards
INTERNET
2008
183views more  INTERNET 2008»
13 years 7 months ago
Securing Wireless Mesh Networks
Steve Glass, Marius Portmann, Vallipuram Muthukkum...
IJNSEC
2007
130views more  IJNSEC 2007»
13 years 7 months ago
Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs
802.1x is a security protocol based on the frame structure
Ping Ding