Sciweavers

4263 search results - page 51 / 853
» Network Security
Sort
View
CN
2002
87views more  CN 2002»
13 years 7 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
CONEXT
2005
ACM
13 years 9 months ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati
ACSW
2003
13 years 9 months ago
Security in Mobile Communications: Challenges and Opportunities
The nature of mobile communication, characterised for example by terminals having poor user interface and limited processing capacity, as well as complex combination of network pr...
Audun Jøsang, Gunnar Sanderud
IEEEARES
2006
IEEE
14 years 1 months ago
Towards a Security Architecture for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) have the potential to increase road safety and comfort. Especially because of the road safety functions, there is a strong demand for security i...
Klaus Plößl, Thomas Nowey, Christian Ml...
IADIS
2003
13 years 9 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire