Sciweavers

2281 search results - page 129 / 457
» Security Patterns and Secure Systems Design
Sort
View
CODES
2003
IEEE
15 years 5 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang
101
Voted
DANCE
2002
IEEE
15 years 5 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...
119
Voted
WWW
2011
ACM
14 years 7 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
ICDCSW
2011
IEEE
14 years 4 days ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
93
Voted
SSS
2009
Springer
123views Control Systems» more  SSS 2009»
15 years 7 months ago
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...
Márk Jelasity, Vilmos Bilicki