Sciweavers

1051 search results - page 158 / 211
» Secure Continuity for Sensor Networks
Sort
View
SAFECOMP
2007
Springer
15 years 9 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 3 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
TSMC
2008
172views more  TSMC 2008»
15 years 2 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
ICNP
2006
IEEE
15 years 9 months ago
Key Grids: A Protocol Family for Assigning Symmetric Keys
We describe a family of ÐÓ Ò protocols for assigning symmetric keys to Ò processes in a network so that each process can use its assigned keys to communicate securely with eve...
Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gou...
CORR
2010
Springer
128views Education» more  CORR 2010»
15 years 1 months ago
Effect of Inter Packet Delay in performance analysis of coexistence heterogeneous Wireless Packet Networks
As the explosive growth of the ISM band usage continues, there are many scenarios where different systems operate in the same place at the same time. One of growing concerns is th...
G. M. Tamilselvan, A. Shanmugam