Sciweavers

518 search results - page 43 / 104
» Abstract Interpretation-Based Protection
Sort
View
116
Voted
GLOBECOM
2007
IEEE
15 years 8 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 8 months ago
Turbo Codes Based Image Transmission for Channels with Both Random Errors and Packet Loss
Abstract— In this paper, we propose an unequal error protection (UEP) framework for progressive image transmission over wireless networks with both random errors and packet loss....
Lei Yao, Lei Cao
123
Voted
ATC
2007
Springer
15 years 8 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
CASSIS
2004
Springer
15 years 8 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
EDBTW
2004
Springer
15 years 8 months ago
XML-Based Revocation and Delegation in a Distributed Environment
Abstract. The rapid increase on the circulation of data over the web has highlighted the need for distributed storage of Internet-accessible information due to the rapid increase o...
Konstantina Stoupa, Athena Vakali, Fang Li, Ioanni...