Sciweavers

1564 search results - page 131 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
CORR
2006
Springer
118views Education» more  CORR 2006»
15 years 4 months ago
Wireless Information-Theoretic Security - Part I: Theoretical Aspects
In this two-part paper, we consider the transmission of confidential data over wireless wiretap channels. The first part presents an information-theoretic problem formulation in w...
Matthieu Bloch, João Barros, Miguel R. D. R...
IJNSEC
2008
69views more  IJNSEC 2008»
15 years 4 months ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu
TSE
2008
128views more  TSE 2008»
15 years 4 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
JMM
2007
107views more  JMM 2007»
15 years 4 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
GLOBECOM
2009
IEEE
15 years 2 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu