Sciweavers

1597 search results - page 75 / 320
» Mental Models of Computer Security
Sort
View
ICON
2007
IEEE
15 years 8 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
JCS
2002
94views more  JCS 2002»
15 years 1 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
CVPR
1998
IEEE
16 years 4 months ago
Stereo and Color Analysis for Dynamic Obstacle Avoidance
We develop a vision system for highly mobile autonomous agents that is capable of dynamic obstacle avoidance. We demonstrate the robust performance of the system in artificial ani...
Tamer F. Rabie, Demetri Terzopoulos
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 8 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
IEEESP
2010
99views more  IEEESP 2010»
15 years 14 days ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore