Sciweavers

5511 search results - page 37 / 1103
» Security for Network Places
Sort
View
119
Voted
ISPEC
2009
Springer
15 years 10 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
103
Voted
NORDSEC
2009
Springer
15 years 10 months ago
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic
Ejaz Ahmed, Andrew Clark, George M. Mohay
82
Voted
CCS
2007
ACM
15 years 10 months ago
Robust key generation from signal envelopes in wireless networks
Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Me...
84
Voted
CRITIS
2006
15 years 7 months ago
Intelligent Network-Based Early Warning Systems
Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
97
Voted
SP
2002
IEEE
15 years 3 months ago
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
Dawn Xiaodong Song, J. D. Tygar, David Zuckerman