Sciweavers

4263 search results - page 165 / 853
» Network Security
Sort
View
141
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
124
Voted
IPTPS
2004
Springer
15 years 9 months ago
Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks
We propose a new cryptographic technique, Acknowledgment Compression, permitting senders of multicast data to verify that all interested parties have either received the data or l...
Antonio Nicolosi, David Mazières
133
Voted
IICS
2001
Springer
15 years 8 months ago
Hardware Security Concept for Spontaneous Network Integration of Mobile Devices
In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage ...
Igor Sedov, Marc Haase, Clemens H. Cap, Dirk Timme...
136
Voted
COLCOM
2008
IEEE
15 years 5 months ago
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers i...
Tuan Phan, Danfeng (Daphne) Yao
132
Voted
CRITIS
2007
15 years 5 months ago
Managing Critical Infrastructures through Virtual Network Communities
Abstract. Virtual Interacting Network CommunIty (Vinci) is an abstract architecture to share in a secure way an ICT infrastructure among several user communities, each with its own...
Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra