Sciweavers

1748 search results - page 113 / 350
» Security Models for Heterogeneous Networking
Sort
View
119
Voted
ACISP
2007
Springer
15 years 7 months ago
On Proactive Perfectly Secure Message Transmission
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...
132
Voted
CRITIS
2007
15 years 5 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
144
Voted
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 9 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
142
Voted
ICWE
2003
Springer
15 years 8 months ago
X-SHAAD: An XML Implementation for Hypermedia Systems Modeling through SHAAD
Abstract. In this paper we present an implementation using XML and Java (XSHAAD) based on a modular architecture of SHAAD to support a web-based Adaptive Hypermedia System. This ar...
David Mérida, Ramón Fabregat, Carlos...
109
Voted
EOR
2007
104views more  EOR 2007»
15 years 3 months ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier