Sciweavers

5665 search results - page 240 / 1133
» Introduction to Computer Security
Sort
View
97
Voted
ICCSA
2004
Springer
15 years 5 months ago
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the...
Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moo...
AINA
2010
IEEE
15 years 5 months ago
Design and Construction of a Prototype Secure Wireless Mesh Network Testbed
—Wireless Mesh Network (WMN) is a promising broadband wireless network architecture. Security is an important component of the WMN architecture but is not fully considered so far...
Donglai Sun, Yue Wu, Tian Wu, Yang Liu, Ning Liu, ...
114
Voted
CSE
2009
IEEE
15 years 4 months ago
A Unified Approach to Intra-domain Security
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to sec...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
87
Voted
SEC
2001
15 years 1 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...
IPPS
1999
IEEE
15 years 4 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...