Browsing by Subject "Network security"
Now showing items 1-16 of 16
-
Article
Data-centric privacy protocol for intensive care grids
(2010)Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid systems. In particular, intensive care medicine uses ...
-
Article
Do human cognitive differences in information processing affect preference and performance of CAPTCHA?
(2015)A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a widely used security defense mechanism that is utilized by service providers to determine whether the entity interacting with their ...
-
Article
A graph-theoretic network security game
(2005)Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. We model this practical network scenario as a non-cooperative multi-player game on ...
-
Article
A graph-theoretic network security game
(2008)Consider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multi-player game on a graph, ...
-
Conference Object
IHIP: Towards a user centric Individual Human Interaction Proof framework
(Association for Computing Machinery, 2015)A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a widely used Human Interaction Proof mechanism to protect on-line services against automated software agents. Nowadays, there is a ...
-
Conference Object
A novel 3-d model for node and system trust
(2011)Nowadays, there is an increasing demand for wireless and mobile networks that guarantee secure and reliable data communication among users. To enable data exchanges, authentication mechanisms need to be in place to dynamically ...
-
Conference Object
Opacity verification in stochastic discrete event systems
(2010)Motivated by security and privacy considerations in applications of discrete event systems, various notions of opacity have been introduced. Specifically, a system is said to be current-state opaque if the entrance of the ...
-
Article
The price of defense and fractional matchings
(2006)Consider a network vulnerable to security attacks and equipped with defense mechanisms. How much is the loss in the provided security guarantees due to the selfish nature of attacks and defenses? The Price of Defense was ...
-
Article
Security for diversity: Studying the effects of verbal and imagery processes on user authentication mechanisms
(2013)Stimulated by a large number of different theories on human cognition, suggesting that individuals have different habitual approaches in retrieving, recalling, processing and storing verbal and graphical information, this ...
-
Conference Object
Security in future mobile sensor networks - Issues and challenges
(2010)Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
-
Conference Object
Security in future mobile sensor networks - Issues and challenges
(2010)Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
-
Article
Security in the cache and forward architecture for the next generation Internet
(2011)The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network ...
-
Article
Self-stabilizing virtual synchrony
(2015)Virtual synchrony (VS) is an important abstraction that is proven to be extremely useful when implemented over asynchronous, typically large, message-passing distributed systems. Fault tolerant design is critical for the ...
-
Article
A survey on secure multipath routing protocols in WSNs
(2010)Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN ...
-
Article
Using argumentation logic for firewall policy specification and analysis
(2006)Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that ...
-
Conference Object
Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks
(2011)Wireless sensor networks (WSNs) have become a hot research topic in recent years and are considered to be one of the building blocks of pervasive computing. Many diverse, mission-critical applications are deployed, including ...