Sciweavers

5665 search results - page 110 / 1133
» Introduction to Computer Security
Sort
View
COMPUTER
1998
75views more  COMPUTER 1998»
15 years 1 months ago
Security Control for COTS Components
Qun Zhong, Nigel Edwards
APNOMS
2007
Springer
15 years 8 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
99
Voted
GI
2007
Springer
15 years 8 months ago
Developing a Security Event Management System for Intermodal Transport
: Bremen, Federal State of Germany, is planning to set up a headquarter for GMES - Global Monitoring of Environment and Security. One goal of the Institute of Shipping Economics an...
Rainer Müller
JUCS
2010
114views more  JUCS 2010»
14 years 9 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
148
Voted
JCS
2011
156views more  JCS 2011»
14 years 9 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran