Sciweavers

348 search results - page 13 / 70
» On a Network Forensics Model For Information Security
Sort
View
ICN
2005
Springer
14 years 26 days ago
A Practical and Secure Communication Protocol in the Bounded Storage Model
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a un...
Erkay Savas, Berk Sunar
SOUPS
2010
ACM
13 years 7 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 2 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
KIVS
2007
Springer
14 years 1 months ago
Key Exchange for Service Discovery in Secure Content Addressable Sensor Networks
Abstract. Secure Content Addressable Network (SCAN) is an architecture for service discovery in service centric sensor networks that enables dynamic service composition. This paper...
Hans-Joachim Hof, Ingmar Baumgart, Martina Zitterb...
ICC
2007
IEEE
104views Communications» more  ICC 2007»
14 years 1 months ago
Secure Tracking in Sensor Networks
Abstract— Target tracking is a canonical issue in sensor networks research. However, tracking security has gained little or no attention. Once a sensor node is compromised, it wi...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...