Sciweavers

1757 search results - page 95 / 352
» Secure Content Validation
Sort
View
TON
2008
102views more  TON 2008»
15 years 3 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
COMCOM
1999
73views more  COMCOM 1999»
15 years 3 months ago
Securing digital signatures for non-repudiation
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable ...
Jianying Zhou, Kwok-Yan Lam
ICALT
2008
IEEE
15 years 9 months ago
Secure Certification for ePortfolios
Students often build up portfolios of their achievements as they study and present them when they apply for jobs or for further study. Of increasing interest is the concept of an ...
Lisha Chen-Wilson, Patrick Newcombe, Piers Royce, ...
INFOCOM
2008
IEEE
15 years 9 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
ICC
2007
IEEE
157views Communications» more  ICC 2007»
15 years 9 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon