Sciweavers

4264 search results - page 2 / 853
» Provenance-aware secure networks
Sort
View
IFIP
2010
Springer
13 years 5 months ago
Secure Upgrade of Hardware Security Modules in Bank Networks
Riccardo Focardi, Flaminia L. Luccio
SIMULATION
2010
178views more  SIMULATION 2010»
13 years 5 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
IJISEC
2008
188views more  IJISEC 2008»
13 years 9 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 10 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller
PERCOM
2010
ACM
13 years 9 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...