Sciweavers

14824 search results - page 2739 / 2965
» Security - Introduction
Sort
View
130
Voted
TDSC
2008
125views more  TDSC 2008»
15 years 2 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
133
Voted
TDSC
2008
121views more  TDSC 2008»
15 years 2 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
154
Voted
TDSC
2008
152views more  TDSC 2008»
15 years 2 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
134
Voted
TIFS
2008
183views more  TIFS 2008»
15 years 2 months ago
Blind Authentication Using Periodic Properties of Interpolation
In this paper we analyze and analytically describe the specific statistical changes brought into the covariance structure of signal by the interpolation process. We show that inter...
Babak Mahdian, Stanislav Saic
124
Voted
TIFS
2008
145views more  TIFS 2008»
15 years 2 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
« Prev « First page 2739 / 2965 Last » Next »