Sciweavers

5511 search results - page 129 / 1103
» Security for Network Places
Sort
View
137
Voted
WETICE
1997
IEEE
15 years 7 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
163
Voted
CCS
2008
ACM
15 years 5 months ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...
162
Voted
CCS
2010
ACM
15 years 1 months ago
Secure encounter-based social networks: requirements, challenges, and designs
In this paper we outline requirements, challenges, and designs for encounter-based mobile social networks, where relationships are based on a temporarily shared location. To illus...
Abedelaziz Mohaisen, Eugene Y. Vasserman, Max Schu...
110
Voted
ICC
2007
IEEE
104views Communications» more  ICC 2007»
15 years 10 months ago
Secure Tracking in Sensor Networks
Abstract— Target tracking is a canonical issue in sensor networks research. However, tracking security has gained little or no attention. Once a sensor node is compromised, it wi...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...
118
Voted
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 5 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...