Sciweavers

4323 search results - page 65 / 865
» On the Security of 3GPP Networks
Sort
View
CCS
2010
ACM
14 years 7 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
ANCS
2007
ACM
15 years 1 months ago
Design of a network architecture with inherent data path security
Next-generation Internet architectures require designs with inherent security guarantees. We present a network architecture that uses credentials to audit traffic in the data path...
Tilman Wolf
WS
2004
ACM
15 years 3 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
WS
2004
ACM
15 years 3 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
CN
2010
90views more  CN 2010»
14 years 10 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son