Sciweavers

1737 search results - page 56 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CP
2007
Springer
14 years 3 months ago
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
ISICT
2003
13 years 10 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
TDSC
2011
13 years 4 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
IEEEARES
2007
IEEE
14 years 3 months ago
Implementing Network Partition-Aware Fault-Tolerant CORBA Systems
— The current standard for Fault-Tolerance in the Common Object Request Broker Architecture (CORBA) does not support network partitioning. However, distributed systems, and those...
Stefan Beyer, Francesc D. Muñoz-Escoí...
BROADNETS
2006
IEEE
14 years 3 months ago
On the Use of Smart Antennas in Multi-Hop Wireless Networks
— Smart antennas include a broad range of antenna technologies ranging from the simple switched beam to the more sophisticated adaptive arrays and multiple input multiple output ...
Karthikeyan Sundaresan, Sriram Lakshmanan, Raghupa...