Sciweavers

1028 search results - page 131 / 206
» Using Attack Graphs to Design Systems
Sort
View
COMCOM
2010
133views more  COMCOM 2010»
13 years 9 months ago
Measuring long-term location privacy in vehicular communication systems
Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many ...
Zhendong Ma, Frank Kargl, Michael Weber
DRM
2006
Springer
14 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 2 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
CONEXT
2009
ACM
13 years 10 months ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
ICCAD
1999
IEEE
125views Hardware» more  ICCAD 1999»
14 years 1 months ago
Direct synthesis of timed asynchronous circuits
This paper presents a new method to synthesize timed asynchronous circuits directly from the specification without generating a state graph. The synthesis procedure begins with a ...
Sung Tae Jung, Chris J. Myers