Sciweavers

4264 search results - page 55 / 853
» Provenance-aware secure networks
Sort
View
COCOON
2005
Springer
15 years 3 months ago
Radio Networks with Reliable Communication
Abstract. Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the...
Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, H...
CSREASAM
2010
14 years 7 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...
ICNS
2009
IEEE
15 years 4 months ago
Security Solution for Mobile Ad Hoc Network of Networks (MANoN)
Ali H. Al-Bayatti, Hussein Zedan, Antonio Cau
ACSAC
2000
IEEE
15 years 2 months ago
Calculating Costs for Quality of Security Service
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
15 years 5 days ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee