Sciweavers

2358 search results - page 377 / 472
» A Secure Pervasive Environment
Sort
View
129
Voted
BROADCOM
2008
IEEE
15 years 10 months ago
A Roadmap to Proliferate Open Source Software Usage within SA Government Servers
Open Source software (OSS) is increasingly being recognized by the government sector around the world as a viable choice to proprietary software, particularly in a number of areas...
Jabu Mtsweni, Elmarie Biermann
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
15 years 10 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
COLCOM
2008
IEEE
15 years 10 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
ICPP
2008
IEEE
15 years 10 months ago
Overcoming Scalability Challenges for Tool Daemon Launching
: Many tools that target parallel and distributed environments must co-locate a set of daemons with the distributed processes of the target application. However, efficient and por...
Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supins...
ISCAS
2008
IEEE
97views Hardware» more  ISCAS 2008»
15 years 10 months ago
Quality-aware GSM speech watermarking
—Use of watermarking techniques to provide authentication and tamper proofing of speech in mobile environment is becoming important. However, the current efforts do not allow for...
K. J.-L. Christabel, Sabu Emmanuel, Mohan S. Kanka...