Sciweavers

6555 search results - page 1195 / 1311
» Secure attribute-based systems
Sort
View
AINA
2007
IEEE
15 years 8 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
107
Voted
DSN
2007
IEEE
15 years 8 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
GLOBECOM
2007
IEEE
15 years 8 months ago
AMBER Sched: An Analytical Model Based Resource Scheduler for Programmable Routers
—The growth of the Internet in the last years has been pushed by increasing requirements in terms of capacity, security and reliability. Moreover, improvements in multimedia appl...
Domenico Ficara, Stefano Giordano, Michele Pagano,...
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
15 years 8 months ago
An Experiment on the Effects of Interruptions on Individual Work Trajectories and Performance in Critical Environments
Interruptions are a central characteristic of work in critical environments such as hospitals, airlines, and security agencies. Often, interruptions occur as notifications of some...
Suzanne P. Weisband, Kelly J. Fadel, Elisa Mattare...
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 8 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
« Prev « First page 1195 / 1311 Last » Next »