Sciweavers

5665 search results - page 239 / 1133
» Introduction to Computer Security
Sort
View
94
Voted
CONEXT
2008
ACM
15 years 2 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
GI
2009
Springer
14 years 10 months ago
Sensor Integration in the Security Domain
: The Sensor Integration Package is a reusable subsystem, combining the complementary capabilities of radar, infra red and long range day light camera, laser, image processing soft...
Bastian Köhler, Kaeye Dästner, Felix Opi...
107
Voted
APSCC
2009
IEEE
15 years 7 months ago
Security meta-services orchestration architecture
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunit...
Aymen Baouab, Olivier Perrin, Nicolas Biri, Claude...
92
Voted
CONEXT
2006
ACM
15 years 6 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
69
Voted
SAC
2005
ACM
15 years 6 months ago
SELS: a secure e-mail list service
Exchange of private information content among a large number of users via E-mail List Services is becoming increasingly common. In this paper we address security requirements in t...
Himanshu Khurana, Adam J. Slagell, Rafael Bonilla