Sciweavers

2503 search results - page 233 / 501
» Building Computer Network Attacks
Sort
View
95
Voted
PERCOM
2008
ACM
15 years 9 months ago
Improving Emergency Response to Mass Casualty Incidents
Mass causality incidents generate a sequence of response events from the emergency services, requiring the allocation and use of resources in a timely fashion. In this paper we de...
Marcus Lucas da Silva, Vassilis Kostakos, Mitsuji ...
AINA
2005
IEEE
15 years 8 months ago
Grouping Proof for RFID Tags
An RFID tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. The tag is used for management of goods and its distribution. Moreove...
Junichiro Saito, Kouichi Sakurai
114
Voted
GI
2005
Springer
15 years 8 months ago
Security Extensions to MMARP Through Cryptographically Generated Addresses
: The MMARP protocol provides multicast routing in hybrid environments in which an ad hoc network is connected to the Internet. As many other routing protocols it was initially des...
Francisco J. Galera, Pedro M. Ruiz, Antonio F. G&o...
RAID
2001
Springer
15 years 7 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
132
Voted
NDSS
2000
IEEE
15 years 7 months ago
Analysis of a Fair Exchange Protocol
We analyze an optimistic contract signing protocol of Asokan, Shoup, and Waidner as a case study in the applicability of formal methods to verification of fair exchange protocols...
Vitaly Shmatikov, John C. Mitchell