Sciweavers

5511 search results - page 146 / 1103
» Security for Network Places
Sort
View
INTERACT
2007
15 years 5 months ago
ICEbox: Toward Easy-to-Use Home Networking
Home networking is becoming an essential part of everyday life. However, empirical studies and consumer reports indicate that the complexities of configuring and maintaining the ho...
Jeonghwa Yang, W. Keith Edwards
138
Voted
SUTC
2008
IEEE
15 years 10 months ago
Cyber-Physical Systems: A New Frontier
: The report of the President's Council of Advisors on Science and Technology (PCAST) has placed CPS on the top of the priority list for federal research investment [6]. This ...
Lui Sha, Sathish Gopalakrishnan, Xue Liu, Qixin Wa...
113
Voted
NDSS
2006
IEEE
15 years 9 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...
145
Voted
TRIDENTCOM
2010
IEEE
15 years 1 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
134
Voted
CADE
2004
Springer
16 years 4 months ago
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
Graham Steel, Alan Bundy, Monika Maidl