Sciweavers

2057 search results - page 136 / 412
» Distributed Secure Systems: Then and Now
Sort
View
PACT
2005
Springer
15 years 10 months ago
Experimenting with a Multi-agent E-Commerce Environment
Agent technology is often claimed to be the most natural approach for automating e-commerce business processes. Despite these claims, up till now, the most successful e-commerce sy...
Costin Badica, Maria Ganzha, Marcin Paprzycki, Ama...
ATC
2007
Springer
15 years 10 months ago
A Distributed Self-healing Data Store
Due to the huge amount of integrated devices and sensors in everyday objects ubiquitous systems are in vicinity and will be deployed in large scales in the near future. We expect t...
Wolfgang Trumler, Jörg Ehrig, Andreas Pietzow...
SUTC
2006
IEEE
15 years 10 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
14 years 11 months ago
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 4 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...