Sciweavers

94 search results - page 11 / 19
» A Regulated Approach to Certificate Management
Sort
View
SAC
2008
ACM
13 years 9 months ago
Contextualizing normative open multi-agent systems
Open MASs can be extremely dynamic due to heterogeneous agents that migrate among them to obtain resources or services not found locally. In order to prevent malicious actions and...
Carolina Howard Felicíssimo, Caroline Chopi...
BMCBI
2008
82views more  BMCBI 2008»
13 years 10 months ago
Studying the functional conservation of cis-regulatory modules and their transcriptional output
Background: Cis-regulatory modules (CRMs) are distinct, genomic regions surrounding the target gene that can independently activate the promoter to drive transcription. The activa...
Denis C. Bauer, Timothy L. Bailey
EUROPKI
2004
Springer
14 years 3 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
CAISE
2009
Springer
14 years 1 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 9 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin