Sciweavers

418 search results - page 1 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
ESAS
2007
Springer
13 years 11 months ago
Security Associations in Personal Networks: A Comparative Analysis
Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different pro...
Jani Suomalainen, Jukka Valkonen, N. Asokan
HUC
2010
Springer
13 years 6 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
FC
2007
Springer
136views Cryptology» more  FC 2007»
13 years 11 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
AIR
2004
91views more  AIR 2004»
13 years 5 months ago
A Personalized Defection Detection and Prevention Procedure based on the Self-Organizing Map and Association Rule Mining: Applie
Abstract. Customer retention is an increasingly pressing issue in today's competitive environment. This paper proposes a personalized defection detection and prevention proced...
Hee Seok Song, Jae Kyeong Kim, Yeong Bin Cho, Soun...
COMSIS
2006
100views more  COMSIS 2006»
13 years 5 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic