Sciweavers

4263 search results - page 59 / 853
» Network Security
Sort
View
NDSS
1998
IEEE
15 years 4 months ago
Automated Recovery in a Secure Bootstrap Process
William A. Arbaugh, Angelos D. Keromytis, David J....
NDSS
1997
IEEE
15 years 4 months ago
Securing Distance-Vector Routing Protocols
Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-...
RAID
2010
Springer
14 years 10 months ago
A Centralized Monitoring Infrastructure for Improving DNS Security
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto...
CSREASAM
2006
15 years 1 months ago
The Information Security Guideline for SMEs in Korea
To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
ADHOC
2010
97views more  ADHOC 2010»
15 years 3 hour ago
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...