Sciweavers

1352 search results - page 196 / 271
» Designing Security Requirements Models Through Planning
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
IWQOS
2005
Springer
14 years 2 months ago
Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks
Abstract. Object detection quality and network lifetime are two conflicting aspects of a sensor network, but both are critical to many sensor applications such as military surveil...
Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodo...
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
14 years 3 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
AINA
2010
IEEE
14 years 2 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
13 years 9 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...