Sciweavers

2560 search results - page 29 / 512
» Securing VO Management
Sort
View
138
Voted
CSFW
2011
IEEE
14 years 2 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
INFOCOM
2006
IEEE
15 years 8 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
CCS
2007
ACM
15 years 8 months ago
Security policy compliance with violation management
Julien Brunel, Frédéric Cuppens, Nor...
73
Voted
CCS
2010
ACM
15 years 2 months ago
An opportunistic authority evaluation scheme for data security in crisis management scenarios
Enrico Scalavino, Giovanni Russello, Rudi Ball, Va...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 9 months ago
Detecting SPIT Calls by Checking Human Communication Patterns
— SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot ...
Jürgen Quittek, Saverio Niccolini, Sandra Tar...