Sciweavers

5665 search results - page 170 / 1133
» Introduction to Computer Security
Sort
View
TDSC
2011
13 years 4 months ago
Securing Topology Maintenance Protocols for Sensor Networks
Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia,...
AINA
2007
IEEE
14 years 3 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
GCC
2005
Springer
14 years 2 months ago
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile ...
Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Ki...
ICALP
2005
Springer
14 years 2 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
CCGRID
2002
IEEE
14 years 2 months ago
Symphony - A Java-Based Composition and Manipulation Framework for Computational Grids
We introduce the Symphony framework, a software ion layer that can sit on top of grid systems. Symphony provides a unified API for grid application developers and offers a graphic...
Markus Lorch, Dennis G. Kafura