Sciweavers

3349 search results - page 544 / 670
» Data Security
Sort
View
122
Voted
DBSEC
2003
113views Database» more  DBSEC 2003»
15 years 4 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
112
Voted
JSAC
2008
167views more  JSAC 2008»
15 years 2 months ago
DTN: an architectural retrospective
We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a foc...
Kevin R. Fall, Stephen Farrell
CSE
2009
IEEE
15 years 9 months ago
Ambulation: A Tool for Monitoring Mobility Patterns over Time Using Mobile Phones
An important tool for evaluating the health of patients who suffer from mobility-affecting chronic diseases such as MS, Parkinson’s, and Muscular Dystrophy is assessment of how ...
Jason Ryder, Brent Longstaff, Sasank Reddy, Debora...
130
Voted
BIBE
2004
IEEE
107views Bioinformatics» more  BIBE 2004»
15 years 6 months ago
Fast Parallel Molecular Algorithms for DNA-based Computation: Factoring Integers
The RSA public-key cryptosystem is an algorithm that converts input data to an unrecognizable encryption and converts the unrecognizable data back into its original decryption form...
Weng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo
183
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
15 years 2 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...