Sciweavers

878 search results - page 124 / 176
» A Compiler-Based Approach to Data Security
Sort
View
CSREASAM
2006
14 years 11 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
COMCOM
2008
91views more  COMCOM 2008»
14 years 10 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
IJNSEC
2008
160views more  IJNSEC 2008»
14 years 9 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler
JOC
2008
97views more  JOC 2008»
14 years 9 months ago
Tag-KEM/DEM: A New Framework for Hybrid Encryption
This paper presents a novel framework for the generic construction of hybrid encryption schemes which produces more efficient schemes than the ones known before. A previous framew...
Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa
TII
2008
132views more  TII 2008»
14 years 9 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...