Sciweavers

947 search results - page 123 / 190
» Provable Implementations of Security Protocols
Sort
View
ATC
2007
Springer
14 years 4 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
IWSEC
2010
Springer
13 years 8 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
INFOCOM
2011
IEEE
13 years 1 months ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
SIGCOMM
2012
ACM
12 years 13 days ago
MultiNet: usable and secure WiFi device association
This demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than con...
Anthony Brown, Richard Mortier, Tom Rodden
USS
2008
14 years 9 days ago
Securing Frame Communication in Browsers
Many web sites embed third-party content in frames, relying on the browser's security policy to protect them from malicious content. Frames, however, are often insufficient i...
Adam Barth, Collin Jackson, John C. Mitchell