Sciweavers

122 search results - page 12 / 25
» INDECT Advanced Security Requirements
Sort
View
CCS
2009
ACM
15 years 3 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
JDCTA
2008
88views more  JDCTA 2008»
14 years 11 months ago
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distributio...
Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang ...
ACIIDS
2009
IEEE
215views Database» more  ACIIDS 2009»
15 years 2 months ago
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs
The field of wireless sensor network (WSN) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and ...
K. Saleem, Norsheila Fisal, M. S. Abdullah, A. B. ...
ACSAC
2007
IEEE
15 years 3 months ago
Toward a Medium-Robustness Separation Kernel Protection Profile
A protection profile for high-robustness separation kernels has recently been validated and several implementations are under development. However, medium-robustness separation ke...
Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine...
ITCC
2005
IEEE
15 years 5 months ago
A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems
Elliptic Curve Cryptosystems (ECC) have become popular in recent years due to their smaller key sizes than traditional public key schemes such as RSA. However the gap between the ...
Francis M. Crowe, Alan Daly, William P. Marnane