Sciweavers

5665 search results - page 111 / 1133
» Introduction to Computer Security
Sort
View
151
Voted
TMC
2012
13 years 4 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
87
Voted
ACSAC
2009
IEEE
15 years 9 months ago
Computer-Related Risk Futures
: This paper reflects on many risks in the development and use of computer-related systems. It considers past and future alternatives, suggests some remedial approaches, and offe...
Peter G. Neumann
SP
2002
IEEE
144views Security Privacy» more  SP 2002»
15 years 1 months ago
ARMS: An agent-based resource management system for grid computing
provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery f...
Junwei Cao, Stephen A. Jarvis, Subhash Saini
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
15 years 16 days ago
State-of-the-art in heterogeneous computing
Node level heterogeneous architectures have become attractive during the last decade for several reasons: compared to traditional symmetric CPUs, they offer high peak performance a...
André Rigland Brodtkorb, Christopher Dyken,...
239
Voted

Lecture Notes
404views
17 years 6 days ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain