Sciweavers

53 search results - page 4 / 11
» Cryptoschemes Based on New Signature Formation Mechanism
Sort
View
IMSA
2001
143views Multimedia» more  IMSA 2001»
13 years 9 months ago
A Collaborative Electronic Laboratory Notebook
We have developed a secure, collaborative, web-based electronic notebook (EN) designed to provide researchers and students with a means to record and share their primary research ...
James D. Myers, Elena S. Mendoza, B. Hoopes
ADHOCNOW
2006
Springer
14 years 1 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong

Publication
165views
15 years 6 months ago
A Timeout Based Congestion Control Scheme for Window Flow- Controlled Networks
During overload, most networks drop packets due to buffer unavailability. The resulting timeouts at the source provide an implicit mechanism to convey congestion signals from the n...
R. Jain
CCS
2005
ACM
14 years 1 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
ATAL
2003
Springer
13 years 11 months ago
Agent memory and adaptation in multi-agent systems
We describe a general mechanism for adaptation in multiagent systems in which agents modify their behavior based on their memory of past events. These behavior changes can be elic...
Kristina Lerman, Aram Galstyan