Sciweavers

5511 search results - page 130 / 1103
» Security for Network Places
Sort
View
135
Voted
AINA
2005
IEEE
15 years 9 months ago
Reducing Security Overhead for Mobile Networks
Security of mobile communications comes with the cost of computational overhead. Reducing the overhead in security computations is critical to ensure the overall performance of a ...
Fangguo Zhang, Yi Mu, Willy Susilo
126
Voted
IPOM
2009
Springer
15 years 10 months ago
Security Considerations for Intrinsic Monitoring within IPv6 Networks
Abstract. Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrie...
Lei Shi, Alan Davy
122
Voted
BROADNETS
2006
IEEE
15 years 9 months ago
A Secure Programming Paradigm for Network Virtualization
—The central paradigm of today’s successful Internet is to keep the network core simple and move complexity towards the network end points. Unfortunately, this very paradigm li...
Ana Milanova, Sonia Fahmy, David Musser, Büle...
137
Voted
ICC
2007
IEEE
254views Communications» more  ICC 2007»
15 years 7 months ago
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory...
Yong Wang, Byrav Ramamurthy
129
Voted
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 10 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis