Sciweavers

734 search results - page 16 / 147
» A Novel Quantitative Approach For Measuring Network Security
Sort
View
SENSYS
2005
ACM
15 years 3 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
DSN
2007
IEEE
15 years 1 months ago
Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes
Increasing interest is being paid to quantitative evaluation based on measurements of dependability attributes and metrics of computer systems and infrastructures. Despite measura...
Andrea Bondavalli, Andrea Ceccarelli, Lorenzo Fala...
PERCOM
2007
ACM
15 years 9 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
APIN
2000
116views more  APIN 2000»
14 years 9 months ago
Application of Cascade Correlation Networks for Structures to Chemistry
Abstract. We present the application of Cascade Correlation for structures to QSPR (quantitative structureproperty relationships) and QSAR (quantitative structure-activity relation...
Anna Maria Bianucci, Alessio Micheli, Alessandro S...
AINA
2007
IEEE
15 years 4 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters