Sciweavers

1353 search results - page 35 / 271
» Securing Current and Future Process Control Systems
Sort
View
125
Voted
CISS
2008
IEEE
15 years 9 months ago
MIMO-assisted channel-based authentication in wireless networks
— Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
FC
2010
Springer
181views Cryptology» more  FC 2010»
15 years 6 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
150
Voted
XMLSEC
2003
ACM
15 years 7 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
CN
2007
141views more  CN 2007»
15 years 2 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
IC
2007
15 years 4 months ago
Gordon Surface Modeling in a Network Environment
—With the advent of the Internet, we have entered the age of ubiquitous systems that will need to be able to communicate, establish criteria for measurement and then perform thes...
Jan Smid, Petr Volf