Sciweavers

4263 search results - page 150 / 853
» Network Security
Sort
View
108
Voted
WS
2006
ACM
15 years 9 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj
141
Voted
ISI
2008
Springer
15 years 2 months ago
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
Luigi Ferrara, Christian Mårtenson, Pontus S...
144
Voted
PEWASUN
2005
ACM
15 years 9 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
155
Voted
SACMAT
2009
ACM
15 years 10 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
109
Voted
SIGMOD
2010
ACM
167views Database» more  SIGMOD 2010»
15 years 3 months ago
Efficient querying and maintenance of network provenance at internet-scale
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network p...
Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, B...