Sciweavers

579 search results - page 55 / 116
» Secure Access to Medical Data over the Internet
Sort
View
IJNSEC
2010
152views more  IJNSEC 2010»
14 years 8 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
COMCOM
2008
101views more  COMCOM 2008»
15 years 1 months ago
High-speed backhaul networks: Myth or reality?
Wireless technology promises a realization of the long-standing vision of ubiquitous high-speed Internet access. WiFi-based wireless mesh networks that provide user access and wir...
Roger Karrer, Alessio Botta, Antonio Pescapè...
TMC
2010
179views more  TMC 2010»
14 years 12 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
ICSE
2000
IEEE-ACM
15 years 5 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
FOSAD
2005
Springer
15 years 7 months ago
Formal Methods for Smartcard Security
Smartcards are trusted personal devices designed to store and process confidential data, and to act as secure tokens for providing access to applications and services. Smartcards ...
Gilles Barthe, Guillaume Dufay