Sciweavers

739 search results - page 137 / 148
» Security Analysis of IEEE 802.16
Sort
View
ICST
2009
IEEE
13 years 7 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
CISS
2010
IEEE
13 years 1 months ago
Retrodirective distributed transmit beamforming with two-way source synchronization
—Distributed transmit beamforming has recently been proposed as a technique in which several single-antenna sources cooperate to form a virtual antenna array and simultaneously t...
Robert D. Preuss, D. Richard Brown
DSN
2011
IEEE
12 years 9 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...
ICC
2011
IEEE
257views Communications» more  ICC 2011»
12 years 9 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...
CORR
2002
Springer
74views Education» more  CORR 2002»
13 years 9 months ago
A logical reconstruction of SPKI
SPKI/SDSI is a proposed public key infrastructure standard that incorporates the SDSI public key infrastructure. SDSI's key innovation was the use of local names. We previous...
Joseph Y. Halpern, Ron van der Meyden