Sciweavers

4263 search results - page 59 / 853
» Network Security
Sort
View
NDSS
1998
IEEE
14 years 2 months ago
Automated Recovery in a Secure Bootstrap Process
William A. Arbaugh, Angelos D. Keromytis, David J....
NDSS
1997
IEEE
14 years 2 months ago
Securing Distance-Vector Routing Protocols
Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-...
RAID
2010
Springer
13 years 8 months ago
A Centralized Monitoring Infrastructure for Improving DNS Security
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto...
CSREASAM
2006
13 years 11 months ago
The Information Security Guideline for SMEs in Korea
To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
ADHOC
2010
97views more  ADHOC 2010»
13 years 10 months ago
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...