Sciweavers

1186 search results - page 73 / 238
» A New Approach to Secure Logging
Sort
View
108
Voted
ESSOS
2009
Springer
15 years 5 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
86
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 20 days ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi
100
Voted
IJNSEC
2006
88views more  IJNSEC 2006»
15 years 17 days ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
ISPAN
2005
IEEE
15 years 6 months ago
Secure Continuity for Sensor Networks
Addition of new nodes to a Sensor Network is a fundamental requirement for their continuity operation over time. We analyze the weakening of security due to node capture when addi...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Leon...
104
Voted
SPC
2005
Springer
15 years 6 months ago
Security Issues for Pervasive Personalized Communication Systems
Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal p...
Bertin Klein, Tristan Miller, Sandra Zilles