Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,758 papers from all fields of science
Search
Sign In
Create Free Account
Differentiated security
Differentiated security is a form of computer security that deploys a range of different security policies and mechanisms according to the identity…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Computer security
Differentiated service
Identity 2.0
Separation of protection and security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Application Adaptive Pattern-based Authentication Method for Smartphones
Dongkil Tak
,
Dongmin Choi
2017
Corpus ID: 196108827
In this paper, we analyze one-factor based user authentication scheme for smartphone proposed earlier. Then, we analyze the most…
Expand
2015
2015
Security and remilitarization in the name of democracy: The impact of global crime control policies in Honduras
Lirio Gutiérrez Rivera
2015
Corpus ID: 55745471
2014
2014
Defining the Internet of Devices: Privacy and Security Implications
Richard L. Rutledge
,
Aaron K. Massey
,
A. Antón
,
Peter P. Swire
2014
Corpus ID: 9333260
Presented at the 2014 Privacy Law Scholars Conference, hosted by the George Washington University Law School in Washington, DC…
Expand
2013
2013
User-centric secure integration of personal RFID tags and sensor networks
Pablo Najera
,
R. Román
,
Javier López
Secur. Commun. Networks
2013
Corpus ID: 206467949
A personal network (PN) should enable the collaboration of user's devices and services in a flexible, self-organizing, and…
Expand
2011
2011
Security for QoS assured wireless and mobile networks
M. Cesana
,
A. Boukerche
,
Albert Y. Zomaya
Secur. Commun. Networks
2011
Corpus ID: 11405622
The rapid evolution of wireless technologies as well as their pervasive diffusion in everyday’s life has dramatically changed the…
Expand
2008
2008
An Architecture for Differentiated Security Service
Jianyong Chen
,
Xiaomin Wang
,
Liwen He
International Symposium on Electronic Commerce…
2008
Corpus ID: 15517094
Applications on network need not only enough quality of service (QoS) but also enough quality of security service (QoSS) because…
Expand
2008
2008
Towards a Policy-based Autonomic Virtual Network to support Differentiated Security Services
S. Davy
,
C. Fahy
,
+5 authors
J. Strassner
2008
Corpus ID: 8431030
This paper presents an approach to provisioning network services in an autonomic network, using virtualised routers as an enabler…
Expand
2007
2007
Non-interactive key establishment in mobile ad hoc networks
Zhenjiang Li
,
J. Garcia-Luna-Aceves
Ad hoc networks
2007
Corpus ID: 7260623
2002
2002
Differentiated security in wireless networks
Andreas Johnsson
2002
Corpus ID: 60292422
This report presents a three step solution to the differentiated security and self-configuration problem in wireless network…
Expand
1999
1999
How to implement Web-based groupware systems based on WebDAV
F. Dridi
,
G. Neumann
Proceedings. IEEE 8th International Workshops on…
1999
Corpus ID: 2571696
The protocol WebDAV (World Wide Web Distributed Authoring and Versioning) is an extension of HTTP/1.1 and defines new methods for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE