Sciweavers

4263 search results - page 11 / 853
» Network Security
Sort
View
CCS
2007
ACM
14 years 1 months ago
Robust key generation from signal envelopes in wireless networks
Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Me...
CRITIS
2006
13 years 11 months ago
Intelligent Network-Based Early Warning Systems
Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
SP
2002
IEEE
13 years 7 months ago
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
IWNAS
2008
IEEE
14 years 2 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
ISSE
2006
13 years 7 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy