Sciweavers

1748 search results - page 146 / 350
» Security Models for Heterogeneous Networking
Sort
View
FLAIRS
2003
15 years 5 months ago
Using Bayesian Networks for Cleansing Trauma Data
Medical data is unique due to its large volume, heterogeneity and complexity. This necessitates costly active participation of medical domain experts in the task of cleansing medi...
Prashant Doshi, Lloyd Greenwald, John R. Clarke
155
Voted
ISF
2008
114views more  ISF 2008»
15 years 3 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
142
Voted
AINA
2006
IEEE
15 years 7 months ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
163
Voted
VLSID
2008
IEEE
191views VLSI» more  VLSID 2008»
15 years 10 months ago
Programming and Performance Modelling of Automotive ECU Networks
The last decade has seen a phenomenal increase in the use of electronic components in automotive systems, resulting in the replacement of purely mechanical or hydraulic-implementa...
Samarjit Chakraborty, Sethu Ramesh
130
Voted
CCS
2008
ACM
15 years 5 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...