Sciweavers

741 search results - page 100 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View

Publication
117views
15 years 2 days ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
INFOCOM
2011
IEEE
14 years 7 months ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
IWANN
2005
Springer
15 years 9 months ago
Face Recognition System Based on PCA and Feedforward Neural Networks
Face recognition is one of the most important image processing research topics which is widely used in personal identification, verification and security applications. In this pape...
Alaa Eleyan, Hasan Demirel
122
Voted
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
15 years 10 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciï¬...
Anooshiravan Saboori, Christoforos N. Hadjicostis
LISA
2001
15 years 5 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman