Sciweavers

3003 search results - page 217 / 601
» Software Security: Building Security In
Sort
View
130
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 5 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
KSEM
2010
Springer
15 years 2 months ago
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Securi
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...
166
Voted
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
14 years 8 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
HICSS
2002
IEEE
115views Biometrics» more  HICSS 2002»
15 years 10 months ago
Hermes--A Lean M-commerce Software Platform Utilizing Electronic Signatures
The world-wide growth of the mobile-telephony market opens the door for mobile commerce (m-commerce). For the restricted target platforms used for m-commerce such as mobile phones...
Sebastian Fischmeister, Günther Hagleitner, W...
IEEEIA
2009
15 years 2 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...