Sciweavers

1823 search results - page 319 / 365
» Agent Amplified Communication
Sort
View
CSFW
2007
IEEE
14 years 5 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
GLOBECOM
2007
IEEE
14 years 5 months ago
Service Oriented Architecture (SOA) for Integration of Field Bus Systems
—The current trends in service consolidation over Internet Protocol (IP) also stimulates the integration of the industrial automation system with the information technology (IT) ...
Xiaohua Tian, Yu Cheng, Rose Qingyang Hu, Yi Qian
ICC
2007
IEEE
14 years 5 months ago
A Mobility Scheme for Personal and Terminal Mobility
Abstract— An IP mobility support protocol that enables personal and terminal mobility for IP-based applications is put forward. This protocol does not require new network entitie...
Bu-Sung Lee, Teck Meng Lim, Chai Kiat Yeo, Quang V...
INFOCOM
2007
IEEE
14 years 5 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
IPCCC
2007
IEEE
14 years 5 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...