Sciweavers

360 search results - page 22 / 72
» Information Security on the Logistical Network: An End-to-En...
Sort
View
NBIS
2009
Springer
14 years 3 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
JSAC
2006
167views more  JSAC 2006»
13 years 8 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
GCC
2004
Springer
14 years 1 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
ISSA
2008
13 years 9 months ago
Towards a Framework for a Network Warfare Capability
Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of v...
Namosha Veerasamy, Jan H. P. Eloff
JSAC
2006
114views more  JSAC 2006»
13 years 8 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu