Sciweavers

1058 search results - page 82 / 212
» Secure Group Communications Using Key Graphs
Sort
View
CCS
2006
ACM
15 years 6 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 2 months ago
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third gener...
R. Shankar, Timothy Rajkumar, P. Dananjayan
135
Voted
MOBISYS
2011
ACM
14 years 5 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
HICSS
2005
IEEE
131views Biometrics» more  HICSS 2005»
15 years 8 months ago
Leading conversations: Communication behaviours of emergent leaders in virtual teams
Virtual teams and their leaders are key players in global organisations. Using teams of workers dispersed temporally and geographically has changed the way people work in groups a...
Fay Sudweeks, Simeon J. Simoff
113
Voted
ADVIS
2004
Springer
15 years 7 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan