Sciweavers

2209 search results - page 47 / 442
» Language Based Secure Communication
Sort
View
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 8 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
ITIIS
2008
128views more  ITIIS 2008»
15 years 1 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
IEEEARES
2007
IEEE
15 years 8 months ago
Reliability Markov Chains for Security Data Transmitter Analysis
Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis ...
Calin Ciufudean, Bianca Satco, Constantin Filote
ESORICS
2009
Springer
16 years 2 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
MMNS
2003
113views Multimedia» more  MMNS 2003»
15 years 3 months ago
Secure Inclusion of Phones Into Online E-meetings
Online Internet based e-meetings for synchronous communication is becoming more and more common and the need for secure communication is a strong requirement from both corporate a...
Peter Parnes