Sciweavers

2358 search results - page 343 / 472
» A Secure Pervasive Environment
Sort
View
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
15 years 11 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
IJCNN
2007
IEEE
15 years 10 months ago
Faults Detection and Isolation Based On Neural Networks Applied to a Levels Control System
Abstract— Each time more grows the necessity of guaranteeing itself security and trustworthiness of the equipment during the execution of the industrials processes. Then, it is v...
Raphaela G. Fernandes, Diego R. Cabral Silva, Luiz...
IPPS
2007
IEEE
15 years 10 months ago
GridCopy: Moving Data Fast on the Grid
An important type of communication in grid and distributed computing environments is bulk data transfer. GridFTP has emerged as a de facto standard for secure, reliable, high-perf...
Rajkumar Kettimuthu, William E. Allcock, Lee Limin...
SOSE
2006
IEEE
15 years 10 months ago
Service Engineering Design Patterns
Design of service-oriented applications differs from design of the component-based applications in granularity, abstraction and dynamic environment in which binding between client...
Nikola Milanovic
COMPSAC
2005
IEEE
15 years 10 months ago
Situation-Awareness for Adaptive Coordination in Service-Based Systems
Service-based systems have many applications, including collaborative research and development, ebusiness, health care, environmental control, military applications, and homeland ...
Stephen S. Yau, Dazhi Huang, Haishan Gong, Hasan D...