Sciweavers

595 search results - page 45 / 119
» Malware Defense Using Network Security Authentication
Sort
View
101
Voted
NCA
2006
IEEE
15 years 8 months ago
A System for Secure IP Telephone Conferences
We present a system for secure telephone conferences (stc) over the internet. The system ensures participant authentication via x.509 certificates, such that every participant of...
Axel Treßel, Jorg Keller
120
Voted
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
15 years 2 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
IJNSEC
2008
160views more  IJNSEC 2008»
15 years 2 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler
120
Voted
ACSAC
2000
IEEE
15 years 7 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
COMSIS
2006
100views more  COMSIS 2006»
15 years 2 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic