Sciweavers

5665 search results - page 235 / 1133
» Introduction to Computer Security
Sort
View
102
Voted
POLICY
2009
Springer
15 years 7 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
50
Voted
DAC
2002
ACM
16 years 1 months ago
System design methodologies for a wireless security processing platform
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...
94
Voted
MOBIHOC
2006
ACM
16 years 2 days ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
74
Voted
P2P
2008
IEEE
15 years 6 months ago
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks
Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenji...
62
Voted
EDOC
2006
IEEE
15 years 6 months ago
An Ontology-based Approach to the Formalization of Information Security Policies
Fernando Náufel do Amaral, Carlos Baz&iacut...