Sciweavers

5665 search results - page 229 / 1133
» Introduction to Computer Security
Sort
View
CHI
2010
ACM
14 years 5 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
CCS
2007
ACM
14 years 4 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
KIVS
2007
Springer
14 years 4 months ago
Key Exchange for Service Discovery in Secure Content Addressable Sensor Networks
Abstract. Secure Content Addressable Network (SCAN) is an architecture for service discovery in service centric sensor networks that enables dynamic service composition. This paper...
Hans-Joachim Hof, Ingmar Baumgart, Martina Zitterb...
AINA
2005
IEEE
14 years 4 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
NDSS
2005
IEEE
14 years 4 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot