Sciweavers

468 search results - page 20 / 94
» Security Weaknesses in Bluetooth
Sort
View
ISICT
2003
13 years 8 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
NDSS
1997
IEEE
13 years 11 months ago
Blocking Java Applets at the Firewall
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementat...
David M. Martin Jr., Sivaramakrishnan Rajagopalan,...
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
14 years 1 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 1 months ago
On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have bought to the forefront the seriousness of the security threat to this increasingly popular mean...
Krishna K. Ramachandran, Biplab Sikdar
PROVSEC
2010
Springer
13 years 5 months ago
Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm
Generic constructions of designated confirmer signatures follow one of the following two strategies; either produce a digital signature on the message to be signed, then encrypt th...
Laila El Aimani