Sciweavers

2699 search results - page 413 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
IWCMC
2006
ACM
14 years 3 months ago
A joint technical and micro-economic investigation of pricing data services over wireless LANs
In this paper, we analyze a wireless LAN hot-spot, based on the IEEE 802.11b protocol, and more specifically we address the issue of defining proper pricing strategies, from bot...
Leonardo Badia, Federico Rodaro, Michele Zorzi
ESORICS
2009
Springer
14 years 9 months ago
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
In distributed systems users need to share sensitive objects with others based on the recipients' ability to satisfy a policy. Attribute-Based Encryption (ABE) is a new parad...
Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhaka...
PERCOM
2009
ACM
14 years 9 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
ACSAC
2009
IEEE
14 years 3 months ago
HIMA: A Hypervisor-Based Integrity Measurement Agent
Abstract—Integrity measurement is a key issue in building trust in distributed systems. A good solution to integrity measurement has to provide both strong isolation between the ...
Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan ...
ACSAC
2006
IEEE
14 years 3 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...