Sciweavers

2560 search results - page 29 / 512
» Securing VO Management
Sort
View
CSFW
2011
IEEE
12 years 10 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
INFOCOM
2006
IEEE
14 years 5 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
CCS
2007
ACM
14 years 5 months ago
Security policy compliance with violation management
Julien Brunel, Frédéric Cuppens, Nor...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 5 months ago
Detecting SPIT Calls by Checking Human Communication Patterns
— SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot ...
Jürgen Quittek, Saverio Niccolini, Sandra Tar...