Sciweavers

3003 search results - page 159 / 601
» Software Security: Building Security In
Sort
View
PERCOM
2008
ACM
16 years 4 months ago
P2PNS: A Secure Distributed Name Service for P2PSIP
Decentralized Voice over IP networks are a promising alternative to classical server-based SIP networks especially in disaster areas or areas without centralized infrastructure. T...
Ingmar Baumgart
ESOP
2010
Springer
16 years 1 months ago
Automating Security Mediation Placement
Abstract. We present a framework that automatically produces suggestions to resolve type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive s...
Dave King 0002, Divya Muthukumaran, Sanjit A. Sesh...
ICW
2005
IEEE
209views Communications» more  ICW 2005»
15 years 10 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...
IWIA
2005
IEEE
15 years 10 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner