Sciweavers

5741 search results - page 24 / 1149
» Accessibility in oriented networks
Sort
View
128
Voted
AUSFORENSICS
2003
15 years 5 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
112
Voted
IJNSEC
2008
103views more  IJNSEC 2008»
15 years 3 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
98
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
Poster abstract: scalable and collaborative internet access for opportunistic people networks
Ling-Jyh Chen, Ting-Kai Huang, Che-Liang Chiou
105
Voted
IPL
2010
65views more  IPL 2010»
15 years 2 months ago
A network flow based approach for network selection in dynamic spectrum access networks
Santhanakrishnan Anand, Rajarathnam Chandramouli
140
Voted
SOCO
2007
Springer
15 years 9 months ago
Aspect-Oriented Programming: Selecting and Exposing Object Paths
Aspects require access to the join point context in order to select and adapt join points. For this purpose, current aspect-oriented systems offer a large number of pointcut constr...
Mohammed Al-Mansari, Stefan Hanenberg, Rainer Unla...