Sciweavers

5665 search results - page 235 / 1133
» Introduction to Computer Security
Sort
View
POLICY
2009
Springer
15 years 8 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
56
Voted
DAC
2002
ACM
16 years 3 months ago
System design methodologies for a wireless security processing platform
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...
109
Voted
MOBIHOC
2006
ACM
16 years 1 months ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
85
Voted
P2P
2008
IEEE
15 years 8 months ago
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks
Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenji...