Sciweavers

434 search results - page 39 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
ISW
2009
Springer
14 years 3 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
COMCOM
2004
109views more  COMCOM 2004»
13 years 8 months ago
User-space auto-tuning for TCP flow control in computational grids
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many hig...
Mark K. Gardner, Sunil Thulasidasan, Wu-chun Feng
ICCSA
2010
Springer
14 years 3 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
ICMCS
2007
IEEE
175views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Clicker - An IPTV Remote Control in Your Cell Phone
This paper investigates a novel concept of providing seamless control and portability of an IPTV viewing session. A solution employing a middleware system, a secure hardware token...
Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yenn...
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
14 years 1 months ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards