Sciweavers

636 search results - page 83 / 128
» Security Management in the Next Generation Wireless Networks
Sort
View
GD
2008
Springer
14 years 10 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
CCS
2005
ACM
15 years 3 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
VTC
2006
IEEE
179views Communications» more  VTC 2006»
15 years 3 months ago
An Efficient Handover Scheme Based on Fast Mobile IPv6
— Handover of a call from wireless LAN (WLAN) to third generation cellular system and vice versa is one of the challenges faced by the integrated 3G-WLAN networks. Evolution of 3...
Shanthy Menezes, S. Venkatesan, Kwang-hyun Rho
DATE
2003
IEEE
106views Hardware» more  DATE 2003»
15 years 3 months ago
Reconfigurable Signal Processing in Wireless Terminals
In this paper, we show the necessity of reconfigurable hardware for data and signal processing in wireless mobile terminals. We first identify the key processing power requirement...
Jürgen Helmschmidt, Eberhard Schüler, Pr...
PERVASIVE
2007
Springer
15 years 3 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen