— In this paper, we look at multiple antenna systems and code information on the communication medium itself to improve the link security. In the case of single data stream trans...
Xin Zhou, Persefoni Kyritsi, Patrick C. F. Eggers,...
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
There is an increasing need within the Navy and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and survivable in the face of att...