- Full text PDF available (4)
- This year (0)
- Last 5 years (3)
- Last 10 years (10)
Journals and Conferences
New and innovative technologies will only make a difference if they are deployed and used. It does not matter how visionary a technology is unless it meets the needs and requirements of customers/users and it is available as a product via… (More)
DNSSEC is properly understood as a component in an ecology of security protocols and measures.
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and applying ethical principles in networking and security research rooted in the guidance suggested by an ongoing Department of Homeland Security working group on ethics. By providing… (More)
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure network access system for wireless sensor networks. This paper makes three contributions: First, it… (More)
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
On 28 December 2011, the US Department of Homeland Security, Science and Technology, Cyber Security Division released "The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research" to the Federal Register to elicit the public's feedback. In this article, the authors briefly describe the road to this milestone, summarize the… (More)