Sciweavers

2517 search results - page 255 / 504
» Secure Deployment of Components
Sort
View
106
Voted
CCS
2004
ACM
15 years 8 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ACSAC
2003
IEEE
15 years 7 months ago
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
Nathan Carey, George M. Mohay, Andrew Clark
121
Voted
DEXAW
2007
IEEE
113views Database» more  DEXAW 2007»
15 years 6 months ago
A new domain-based payment model for emerging mobile commerce scenarios
Most of the security proposals in m-commerce scenarios have been based on a classical payment model, which basically establishes relationships across domains among customers and me...
Diego Suarez, Joaquín Torres Márquez...
152
Voted
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 9 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
114
Voted
ICST
2009
IEEE
15 years 9 months ago
Quality Assurance of Software Applications Using the In Vivo Testing Approach
Software products released into the field typically have some number of residual defects that either were not detected or could not have been detected during testing. This may be...
Christian Murphy, Gail E. Kaiser, Ian Vo, Matt Chu