Sciweavers

12637 search results - page 233 / 2528
» Security for Extensible Systems
Sort
View
189
Voted
NORDSEC
2009
Springer
15 years 9 months ago
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
In this paper we introduce ContikiSec, a secure network layer for wireless sensor networks, designed for the Contiki Operating System. ContikiSec has a configurable design, providi...
Lander Casado, Philippas Tsigas
APSEC
2006
IEEE
15 years 11 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han
123
Voted
ICFP
2000
ACM
15 years 9 months ago
Static enforcement of security with types
A number of security systems for programming languages have recently appeared, including systems for enforcing some form of ac
Christian Skalka, Scott F. Smith
143
Voted
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
15 years 11 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
HASE
2008
IEEE
15 years 11 months ago
Using Multi-Level Security Annotations to Improve Software Assurance
Current annotation technologies suffer from poor coverage over the development process phases, limited support for the broad scope of the security requirement types and inadequate...
Eryk Kylikowski, Riccardo Scandariato, Wouter Joos...