Sciweavers

2261 search results - page 78 / 453
» Dynamic types for authentication
Sort
View
EVOW
2010
Springer
14 years 2 months ago
Memory Design for Constrained Dynamic Optimization Problems
A proposal for a memory design is given that is suitable for solving constrained dynamic optimization problems by an evolutionary m. Based on ideas from abstract memory, two scheme...
Hendrik Richter
HICSS
2002
IEEE
124views Biometrics» more  HICSS 2002»
14 years 1 months ago
Dynamics, Criticality and Self-Organization in a Model for Blackouts in Power Transmission Systems
A model has been developed to study the global complex dynamics of a series of blackouts in power transmission systems [1, 2]. This model has included a simple level of self-organ...
Benjamin A. Carreras, Vickie E. Lynch, Ian Dobson,...
MSWIM
2006
ACM
14 years 2 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
ACISP
2006
Springer
14 years 20 days ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
13 years 6 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer