Sciweavers

859 search results - page 65 / 172
» Security for Key Management Interfaces
Sort
View
DSOM
2008
Springer
13 years 11 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
CCS
2011
ACM
12 years 10 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
FC
2004
Springer
78views Cryptology» more  FC 2004»
14 years 3 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
UIST
2010
ACM
13 years 7 months ago
Eden: supporting home network management through interactive visual tools
As networking moves into the home, home users are increasingly being faced with complex network management chores. Previous research, however, has demonstrated the difficulty many...
Jeonghwa Yang, W. Keith Edwards, David Haslem
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 10 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen