Sciweavers

2358 search results - page 385 / 472
» A Secure Pervasive Environment
Sort
View
ADHOCNETS
2009
Springer
15 years 4 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
WETICE
1998
IEEE
15 years 4 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes
ESAS
2007
Springer
15 years 3 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ESCIENCE
2007
IEEE
15 years 3 months ago
Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines
Scientific workflows have recently emerged as a new paradigm for representing and managing complex distributed scientific computations and data analysis, and have enabled and acce...
Ping Yang, Zijiang Yang, Shiyong Lu
HUC
2007
Springer
15 years 3 months ago
Amigo: Proximity-Based Authentication of Mobile Devices
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices us...
Alex Varshavsky, Adin Scannell, Anthony LaMarca, E...