Sciweavers

3638 search results - page 52 / 728
» Distribution chain security
Sort
View
ORDER
2010
110views more  ORDER 2010»
13 years 7 months ago
The Complexity of Embedding Orders into Small Products of Chains
Embedding a partially ordered set into a product of chains is a classical way to encode it. Such encodings have been used in various fields such as object oriented programming or ...
Olivier Raynaud, Eric Thierry
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 3 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
13 years 10 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 9 months ago
Improved Security Mechanism for Mobile IPv6
Security is a critical design issue in Mobile IPv6 since adversaries can take advantage of its routing process and arbitrarily channelize the traffic to different destinations. Th...
Jing Li, Po Zhang, Srinivas Sampalli
CCS
2003
ACM
14 years 19 days ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia