Sciweavers

4263 search results - page 50 / 853
» Network Security
Sort
View
CCS
2010
ACM
13 years 5 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
ESORICS
2004
Springer
14 years 1 months ago
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data
As network traffic increases, the problems associated with monitoring and analyzing the traffic on high speed networks become increasingly difficult. In this paper, we introduce a ...
John McHugh
CN
2010
90views more  CN 2010»
13 years 7 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son
FIS
2010
13 years 8 months ago
Towards a Secure Rendezvous Network for Future Publish/Subscribe Architectures
Publish/Subscribe is often regarded as a promising paradigm for Future Internet architectures. Its information oriented nature and its particular security features have stimulated ...
Nikos Fotiou, Giannis F. Marias, George C. Polyzos
SIGCOMM
2010
ACM
13 years 8 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...