Sciweavers

4263 search results - page 218 / 853
» Network Security
Sort
View
CCS
2009
ACM
16 years 4 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
HASE
2008
IEEE
15 years 10 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
WORDS
2005
IEEE
15 years 9 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
AIMS
2010
Springer
15 years 5 months ago
Towards Flexible and Secure Distributed Aggregation
Distributed aggregation algorithms are important in many present and future computing applications. However, after a decade of research, there are still numerous open questions reg...
Kristján Valur Jónsson, Mads F. Dam
PERCOM
2008
ACM
15 years 4 months ago
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
RFID technology shall increase security, e.g. by helping to prevent counterfeiting. But the technology also causes privacy issues. In this paper, after highlighting goals and prob...
Dirk Henrici, Paul Müller