Sciweavers

392 search results - page 63 / 79
» Security vulnerabilities in IEEE 802.22
Sort
View
SCAM
2008
IEEE
14 years 3 months ago
Parfait - A Scalable Bug Checker for C Code
Parfait is a bug checker of C code that has been designed to address developers’ requirements of scalability (support millions of lines of code in a reasonable amount of time), ...
Cristina Cifuentes
SP
2008
IEEE
14 years 3 months ago
Preventing Memory Error Exploits with WIT
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Periklis Akritidis, Cristian Cadar, Costin Raiciu,...
GLOBECOM
2007
IEEE
14 years 3 months ago
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ACSAC
2006
IEEE
14 years 2 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
ACSAC
2006
IEEE
14 years 2 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu