Sciweavers

4263 search results - page 69 / 853
» Network Security
Sort
View
SASN
2003
ACM
15 years 5 months ago
Random key-assignment for secure Wireless Sensor Networks
Roberto Di Pietro, Luigi V. Mancini, Alessandro Me...
ANCS
2010
ACM
14 years 9 months ago
A traffic-aware top-N firewall ruleset approximation algorithm
Packet classification is widely used in various network security and operation applications. Two of the main challenges are the increasing number of classification rules, amount o...
Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao
ACSAC
1998
IEEE
15 years 4 months ago
Security Services in an Open Service Environment
Emerging telecommunication services use, store, or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommun...
Reiner Sailer
WSC
2007
15 years 2 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
SPW
1999
Springer
15 years 4 months ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson