Sciweavers

2517 search results - page 127 / 504
» Secure Deployment of Components
Sort
View
125
Voted
DSOM
2004
Springer
15 years 9 months ago
HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management
Autonomic distributed management enables for deploying self-directed monitoring and control tasks that track dynamic network problems such as performance degradation and security t...
Ehab S. Al-Shaer, Bin Zhang
143
Voted
JCP
2006
94views more  JCP 2006»
15 years 3 months ago
Broadcast Encryption Using Probabilistic Key Distribution and Applications
A family of novel broadcast encryption schemes based on probabilistic key pre-distribution are proposed, that enable multiple sources to broadcast secrets, without the use of asymm...
Mahalingam Ramkumar
IEEEARES
2009
IEEE
15 years 10 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
ICSE
2000
IEEE-ACM
15 years 7 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
147
Voted
LCN
2008
IEEE
15 years 10 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt