Sciweavers

9503 search results - page 28 / 1901
» Authenticated System Calls
Sort
View
ICC
2007
IEEE
118views Communications» more  ICC 2007»
15 years 8 months ago
Efficient Group Management For Inter-PN Access Control
This paper presents an architecture for resource sharing in Personal Networks (PNs). Resources are not necessarily in the same authentication domain and the group that uses them is...
Ahmad Ahmad, Khaled Masmoudi, Hossam Afifi
ACSAC
2001
IEEE
15 years 8 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin
CCS
2007
ACM
15 years 10 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
GLOBECOM
2007
IEEE
15 years 10 months ago
Cross-Layer Call Admission Control for a CDMA Uplink Employing a Base-Station Antenna Array
— A novel cross-layer call admission control policy is proposed for a general CDMA beamforming system. In contrast to previously proposed call admission control (CAC) policies wh...
Wei Sheng, Steven D. Blostein
IJNSEC
2008
143views more  IJNSEC 2008»
15 years 4 months ago
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo's scheme is vulnerable to ...
Da-Zhi Sun, Zhen-Fu Cao