Sciweavers

5665 search results - page 193 / 1133
» Introduction to Computer Security
Sort
View
SAC
2011
ACM
13 years 1 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
CSFW
2012
IEEE
12 years 21 days ago
Generic Indifferentiability Proofs of Hash Designs
—In this paper, we propose a formal analysis of domain extenders for hash functions in the indifferentiability framework. We define a general model for domain extenders and prov...
Marion Daubignard, Pierre-Alain Fouque, Yassine La...
APNOMS
2006
Springer
14 years 2 months ago
A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks
Abstract. This paper proposes an efficient resource-optimal key predistribution scheme for providing improved security in wireless sensor networks. We exploit the advantages of two...
Tran Thanh Dai, Al-Sakib Khan Pathan, Choong Seon ...
FOSAD
2000
Springer
14 years 1 months ago
Notes on Nominal Calculi for Security and Mobility
Abstract. There is great interest in applying nominal calculi--computational formalisms that include dynamic name generation--to the problems of programming, specifying, and verify...
Andrew D. Gordon
DMIN
2006
123views Data Mining» more  DMIN 2006»
13 years 11 months ago
Novel Evaluation Framework of Intrusion Detection Systems with Respect to Security Policies
Intrusion Detection System is an integral component of the computer security infrastructure. It is usually put in place to detect computer security policy violations. While its ro...
Negmat Mullodzhanov