Sciweavers

29 search results - page 2 / 6
» Towards developing a trust-based security solution
Sort
View
ATAL
2011
Springer
12 years 4 months ago
Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up
The fastest known algorithm for solving General Bayesian Stackelberg games with a finite set of follower (adversary) types have seen direct practical use at the LAX airport for o...
Manish Jain, Christopher Kiekintveld, Milind Tambe
IEEEARES
2007
IEEE
13 years 11 months ago
Towards Secure E-Elections in Turkey: Requirements and Principles
E-democracy is a necessity in this era of computers and information technology. E-voting is one of the most significant parts of e-democracy, which refers to the use of computers ...
Orhan Cetinkaya, Deniz Cetinkaya
COMPSAC
2009
IEEE
13 years 11 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
INTERACT
2007
13 years 6 months ago
ICEbox: Toward Easy-to-Use Home Networking
Home networking is becoming an essential part of everyday life. However, empirical studies and consumer reports indicate that the complexities of configuring and maintaining the ho...
Jeonghwa Yang, W. Keith Edwards
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 4 months ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...