Sciweavers

3420 search results - page 520 / 684
» A Language-Based Approach to Security
Sort
View
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 11 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
INFOCOM
2008
IEEE
15 years 11 months ago
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
Wensheng Zhang, Nalin Subramanian, Guiling Wang
AINA
2007
IEEE
15 years 11 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
AINA
2007
IEEE
15 years 11 months ago
Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services
In recent years a movement from distributed systems controlled by users to automatic, autonomous and self-configuring distributed systems is noticeable. Web services is one approa...
Elmar Zeeb, Andreas Bobek, Hendrik Bohn, Frank Gol...
120
Voted
CEC
2007
IEEE
15 years 11 months ago
A genetic algorithm for solving the binning problem in networked applications detection
Network administrators need a tool that detects the kind of applications running on their networks, in order to allocate resources and enforce security policies. Previous work sho...
Maxim Shevertalov, Edward Stehle, Spiros Mancoridi...