Sciweavers

392 search results - page 32 / 79
» Security vulnerabilities in IEEE 802.22
Sort
View
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
14 years 1 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 3 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon
IEEEARES
2010
IEEE
14 years 3 months ago
Security and Usability: Analysis and Evaluation
Abstract—The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many ...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ACSAC
2005
IEEE
14 years 2 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
ACSAC
2004
IEEE
14 years 17 days ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner