Sciweavers

5665 search results - page 148 / 1133
» Introduction to Computer Security
Sort
View
SAC
2008
ACM
13 years 8 months ago
Securing aspect composition
Andrew Camilleri, Lynne Blair, Geoffrey Coulson
PERCOM
2010
ACM
13 years 7 months ago
When Eco-IT meets security: Concealed network coding for multicast traffic
Alban Hessler, Takahiro Kakumaru, Dirk Westhoff
COMCOM
2011
13 years 4 months ago
Securing the data path of next-generation router systems
Tilman Wolf, Russell Tessier, Gayatri Prabhu
IDTRUST
2010
ACM
14 years 4 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier