Sciweavers

495 search results - page 16 / 99
» MASC - Monitoring and Security of Containers
Sort
View
IPCCC
2006
IEEE
15 years 4 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
TWC
2008
186views more  TWC 2008»
14 years 10 months ago
SLAB: A secure localized authentication and billing scheme for wireless mesh networks
Abstract--The future metropolitan-area wireless mesh networks (WMNs) are expected to contain compromise-prone Mesh Access Points (MAPs) with a high frequency of inter-domain roamin...
Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho,...
93
Voted
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 4 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas
INFOSECCD
2006
ACM
15 years 4 months ago
Campus-wide spyware and virus removal as a method of teaching information security
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university’s network u...
Frank H. Katz
DBSEC
2007
80views Database» more  DBSEC 2007»
14 years 11 months ago
A Scalable and Secure Cryptographic Service
In this paper we present the design of a scalable and secure cryptographic service that can be adopted to support large-scale networked systems, which may require strong authentica...
Shouhuai Xu, Ravi S. Sandhu