Sciweavers

1737 search results - page 28 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ACSAC
2008
IEEE
13 years 8 months ago
YAGP: Yet Another Graphical Password Strategy
Alphanumeric passwords are widely used in computer and network authentication to protect users' privacy. However, it is well known that long, textbased passwords are hard for...
Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wan...
CCS
2010
ACM
13 years 5 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
ICASSP
2011
IEEE
12 years 11 months ago
Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI
We investigate secure communications for a four-node relayeavesdropper channel with multiple data stream transmission, assuming that the eavesdropper’s channel state information...
Jing Huang, A. Lee Swindlehurst
ADHOC
2008
132views more  ADHOC 2008»
13 years 8 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
CRITIS
2007
13 years 9 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...