Sciweavers

13277 search results - page 2625 / 2656
» An Approach to Clustering Abstracts
Sort
View
JSAC
2006
156views more  JSAC 2006»
13 years 10 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
NETWORK
2008
107views more  NETWORK 2008»
13 years 10 months ago
HiCon: a hierarchical context monitoring and composition framework for next-generation context-aware services
This article presents a hierarchical context monitoring and composition framework that effectively supports next-generation context-aware services. The upcoming ubiquitous space w...
Kyungmin Cho, Inseok Hwang, Seungwoo Kang, Byoungj...
FAC
2007
128views more  FAC 2007»
13 years 10 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
PERCOM
2008
ACM
13 years 10 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
IEEESP
2007
98views more  IEEESP 2007»
13 years 10 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
« Prev « First page 2625 / 2656 Last » Next »