Sciweavers

4263 search results - page 89 / 853
» Network Security
Sort
View
123
Voted
MSWIM
2005
ACM
15 years 8 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
116
Voted
SAC
2010
ACM
15 years 9 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
IPCCC
2006
IEEE
15 years 8 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
PODC
2011
ACM
14 years 5 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
IFIP
2009
Springer
15 years 8 days ago
Specification and Verification of Side Channel Declassification
Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems
Josef Svenningsson, David Sands