Sciweavers

5665 search results - page 189 / 1133
» Introduction to Computer Security
Sort
View
COMCOM
2011
14 years 7 months ago
An RFID secure authentication mechanism in WLAN
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...
CHI
2011
ACM
14 years 4 months ago
Data type based security alert dialogs
Max-Emanuel Maurer, Alexander De Luca, Heinrich Hu...
129
Voted
COORDINATION
2011
Springer
14 years 4 months ago
Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces
Fan Yang, Tomoyuki Aotani, Hidehiko Masuhara, Flem...
WS
2006
ACM
15 years 6 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
CCS
2006
ACM
15 years 4 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough