Sciweavers

5665 search results - page 290 / 1133
» Introduction to Computer Security
Sort
View
CORR
2006
Springer
82views Education» more  CORR 2006»
15 years 17 days ago
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such ...
Véronique Cortier, Heinrich Hördegen, ...
WCNC
2010
IEEE
14 years 11 months ago
Characterization of the Secrecy Region of a Single Relay Cooperative System
Abstract—Security is an important aspect for the future wireless networks. Since the number of network nodes increases constantly, and, in addition, the networks are decentralize...
Ninoslav Marina, Are Hjørungnes
PERCOM
2007
ACM
16 years 4 days ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
107
Voted
MOBISYS
2007
ACM
16 years 4 days ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
NOSSDAV
2009
Springer
15 years 7 months ago
End-to-end secure delivery of scalable video streams
We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is ...
Kianoosh Mokhtarian, Mohamed Hefeeda