ESORICS
13 years 10 months ago
2004 Springer
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
ESORICS
13 years 10 months ago
2004 Springer
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ...
ESORICS
13 years 10 months ago
2004 Springer
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
ESORICS
13 years 10 months ago
2004 Springer
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
ESORICS
13 years 10 months ago
2004 Springer |