Sciweavers

2517 search results - page 116 / 504
» Secure Deployment of Components
Sort
View
110
Voted
MUE
2007
IEEE
150views Multimedia» more  MUE 2007»
15 years 9 months ago
Security Issues in Wireless Mesh Networks
Wireless Mesh Network (WMN) is a new wireless networking paradigm. Unlike traditional wireless networks, WMNs do not rely on any fixed infrastructure. Instead, hosts rely on each ...
Muhammad Shoaib Siddiqui, Choong Seon
127
Voted
EVOW
2006
Springer
15 years 7 months ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq
131
Voted
USENIX
2004
15 years 4 months ago
Building Secure High-Performance Web Services with OKWS
OKWS is a toolkit for building fast and secure Web services. It provides Web developers with a small set of tools that has proved powerful enough to build complex systems with lim...
Maxwell N. Krohn
124
Voted
CN
2002
87views more  CN 2002»
15 years 3 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
151
Voted
ISW
2010
Springer
15 years 1 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin