Sciweavers

5665 search results - page 262 / 1133
» Introduction to Computer Security
Sort
View
IEEEARES
2006
IEEE
14 years 4 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
IEEESP
2010
99views more  IEEESP 2010»
13 years 9 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
15 years 3 days ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
14 years 5 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
14 years 4 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner