Sciweavers

5665 search results - page 235 / 1133
» Introduction to Computer Security
Sort
View
POLICY
2009
Springer
14 years 5 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
DAC
2002
ACM
14 years 11 months ago
System design methodologies for a wireless security processing platform
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...
MOBIHOC
2006
ACM
14 years 10 months ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
P2P
2008
IEEE
14 years 4 months ago
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks
Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenji...