Sciweavers

5511 search results - page 34 / 1103
» Security for Network Places
Sort
View
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 10 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
CCS
2007
ACM
14 years 4 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola
CCS
2000
ACM
14 years 2 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
SISW
2003
IEEE
14 years 3 months ago
Information Security on the Logistical Network: An End-to-End Approach
We describe the information security aspects of logistical networking. The security model adopted by logistical networking is an end-to-end model that provides tunable security le...
Micah Beck, James S. Plank, Jeremy Millar, Scott A...
ESORICS
1994
Springer
14 years 2 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid