Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Uri Blumenthal"'
Autor:
Ariel Hamlin, Robert K. Cunningham, Uri Blumenthal, John Darby Mitchell, Richard Shay, Vijay Gadepally
Publikováno v:
ACM SIGMOD Record. 47:17-22
This paper presents a vision and description for query control, which is a paradigm for database access control. In this model, individual queries are examined before being executed and are either allowed or denied by a pre-defined policy. Traditiona
Autor:
Sarvar Patel, Juan A. Garay, Dorothy Voytko Stanley, Luca Salgarelli, Uri Blumenthal, Milind M. Buddhikot, Scott C. Miller
Publikováno v:
Bell Labs Technical Journal. 7:37-48
Despite significant shortcomings in the initial security architecture, 802.11 wireless LANs have experienced explosive growth in recent years. Ongoing work in IEEE standards bodies is currently attempting to fix these shortcomings. One specific topic
Autor:
Sarvar Patel, Uri Blumenthal, Michael Marcovici, Marcus Wong, Ganapathy Subramanian Sundaram, Semyon B. Mizikovsky
Publikováno v:
Bell Labs Technical Journal. 7:19-36
Cellular bandits have exploited security limitations of analog technology from its infancy. First-generation analog system security has been primarily left up to system manufacturers and service providers. With the advent of digital technology (secon
Publikováno v:
IEEE Network. 11:26-29
This article describes a key derivation method that greatly simplifies key distribution issues for network management (NM) applications and may in some cases relieve NM stations from the need to store any keys at all. This method is easily generalize
Situational awareness – the perception of “what is going on” – is crucial in every field of human endeavor, especially so in the cyber world where most of the protections afforded by physical time and distance are taken away. Since ancient ti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b7a25c81646eedc4d4dc5e10c5a01fb8
https://doi.org/10.4018/978-1-4666-0104-8.ch006
https://doi.org/10.4018/978-1-4666-0104-8.ch006
Autor:
Uri Blumenthal, Men Long
Publikováno v:
2007 Digest of Technical Papers International Conference on Consumer Electronics.
One-time password (OTP) typically provides a better security protection than static password. However, a hindrance to consumer experience is the OTP manageability: users may need to store many secret values when they use OTP for authentication of dis
Publikováno v:
ISCC
This paper addresses the role of dependency analysis in distributed management. The identification of dependencies becomes increasingly important in today's networked environments because applications and services rely on a variety of supporting serv
Publikováno v:
Information Security and Privacy ISBN: 9783540647324
ACISP
ACISP
In this paper we describe a low-cost method of establishing a secure client-server connection. A commonly used Web procedure is to establish a secure link and then authenticate the client. By reversing the order and authenticating the client before t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::178a74f0706f146fe1f1e2dce3774d04
https://doi.org/10.1007/bfb0053724
https://doi.org/10.1007/bfb0053724
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.