Sciweavers

4263 search results - page 39 / 853
» Network Security
Sort
View
ICDCSW
2000
IEEE
13 years 11 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
MOBISYS
2008
ACM
13 years 10 months ago
Virtualized in-cloud security services for mobile devices
Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, ...
CCS
2008
ACM
13 years 9 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
SPW
2005
Springer
14 years 1 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
CCS
2007
ACM
14 years 1 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...