Sciweavers

739 search results - page 120 / 148
» Security Analysis of IEEE 802.16
Sort
View
IWIA
2005
IEEE
14 years 4 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
EDOC
2000
IEEE
14 years 3 months ago
Ponder: Realising Enterprise Viewpoint Concepts
This paper introduces the Ponder language for specifying distributed object enterprise concepts. Ponder, is a declarative language, which permits the specification of policies in ...
Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemo...
EDOC
2000
IEEE
14 years 3 months ago
Pay As You Go-Associating Costs with Jini Leases
Jini is a technology for building reliable, fault-tolerant distributed applications. Besides offering an infrastructure for clients to locate services, it introduces the concept o...
Peer Hasselmeyer, Markus Schumacher, Marco Vo&szli...
ICMCS
2000
IEEE
145views Multimedia» more  ICMCS 2000»
14 years 3 months ago
Staganalysis of LSB Encoding in Color Images
In this paper, we analyze the security of Least Significant Bit (LSB) embedding for hiding messages in high-color-depth digital images. We introduce a powerful steganalytic techni...
Jiri Fridrich, Rui Du, Meng Long
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
14 years 2 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...