Sciweavers

1737 search results - page 107 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
AOSD
2004
ACM
15 years 5 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
CIC
2006
114views Communications» more  CIC 2006»
15 years 1 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
CCS
2003
ACM
15 years 5 months ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning
IBPRIA
2003
Springer
15 years 5 months ago
A Probabilistic Model for the Cooperative Modular Neural Network
Abstract. This paper presents a model for the probability of correct classification for the Cooperative Modular Neural Network (CMNN). The model enables the estimation of the perf...
Luís A. Alexandre, Aurélio C. Campil...
ICMLA
2007
15 years 1 months ago
Scalable optimal linear representation for face and object recognition
Optimal Component Analysis (OCA) is a linear method for feature extraction and dimension reduction. It has been widely used in many applications such as face and object recognitio...
Yiming Wu, Xiuwen Liu, Washington Mio