Sciweavers

5511 search results - page 81 / 1103
» Security for Network Places
Sort
View
IJNSEC
2010
66views more  IJNSEC 2010»
13 years 5 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
INFORMATICALT
2010
131views more  INFORMATICALT 2010»
13 years 8 months ago
Extended Software Architecture Based on Security Patterns
One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In...
Dusan Savic, Dejan Simic, Sinisa Vlajic
WCNC
2008
IEEE
14 years 4 months ago
Testbed Implementation of a Secure Flooding Time Synchronization Protocol
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shan...
ACSAC
2008
IEEE
14 years 4 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
SIGCOMM
2004
ACM
14 years 3 months ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu