Sciweavers

1352 search results - page 161 / 271
» Designing Security Requirements Models Through Planning
Sort
View
AINA
2006
IEEE
14 years 1 months ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
JWSR
2006
114views more  JWSR 2006»
13 years 10 months ago
Metadata, Ontologies, and Information Models for Grid PSE Toolkits Based on Web Services
: A PSE toolkit is a group of technologies within a software architecture through which multiple PSEs can be built for different application domains. The effective use of a PSE too...
Carmela Comito, Carlo Mastroianni, Domenico Talia
SPW
2000
Springer
14 years 1 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
MOBIHOC
2003
ACM
14 years 3 months ago
Mobility modelling and trajectory prediction for cellular networks with mobile base stations
This paper provides mobility estimation and prediction for a variant of GSM network which resembles an adhoc wireless mobile network where base stations and users are both mobile....
Pubudu N. Pathirana, Andrey V. Savkin, Sanjay Jha
FM
2006
Springer
172views Formal Methods» more  FM 2006»
14 years 1 months ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis