Sciweavers

135 search results - page 14 / 27
» Encompassing Attacks to Attacks in Abstract Argumentation Fr...
Sort
View
CONCUR
2006
Springer
13 years 11 months ago
Weak Bisimulation Up to Elaboration
Abstract We study the use of the elaboration preorder (due to ArunKumar and Natarajan) in the framework of up-to techniques for weak bisimulation. We show that elaboration yields a...
Damien Pous
INFOCOM
2006
IEEE
14 years 1 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang
IEEECIT
2010
IEEE
13 years 5 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
NOMS
2008
IEEE
14 years 1 months ago
Towards malware inspired management frameworks
Abstract—Scalability is a real challenge for network management due to the increase of the devices to be managed and their various locations. A potential solution is based on bot...
Jérôme François, Radu State, O...
FOIKS
2008
Springer
13 years 9 months ago
An Alternative Foundation for DeLP: Defeating Relations and Truth Values
Abstract. In this paper we recast the formalism of argumentation formalism known as DeLP (Defeasible Logic Programming) in game-theoretic terms. By considering a game between a Pro...
Ignacio D. Viglizzo, Fernando A. Tohmé, Gui...