Sciweavers

5511 search results - page 87 / 1103
» Security for Network Places
Sort
View
ADHOC
2010
97views more  ADHOC 2010»
15 years 3 months ago
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
101
Voted
TRIDENTCOM
2008
IEEE
15 years 10 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
105
Voted
SACMAT
2003
ACM
15 years 8 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
127
Voted
AINA
2007
IEEE
15 years 10 months ago
Mobile Agents and the Deus Ex Machina
This paper aims to examine the benefits the introduction of trusted computing can bring to the mobile agent paradigm, with a specific emphasis on mobile agent security.
Shane Balfe, Eimear Gallery
125
Voted
CSFW
2008
IEEE
15 years 5 months ago
A Correctness Proof of a Mesh Security Architecture
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve ...