Sciweavers

2178 search results - page 16 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Survivability Architecture of a Mission Critical System: The DPASA Example
Jennifer Chong, Partha Pratim Pal, Michael Atighet...
99
Voted
CRITIS
2008
15 years 5 months ago
Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture
Pierluigi Assogna, Glauco Bertocchi, Antonio DiCar...
EMSOFT
2005
Springer
15 years 9 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
145
Voted
ESORICS
2008
Springer
15 years 5 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
157
Voted
JCS
2011
156views more  JCS 2011»
14 years 10 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran