Sciweavers

201 search results - page 17 / 41
» Information security in networkable Windows-based operating ...
Sort
View
SEM
2004
Springer
14 years 2 months ago
A Middleware Centric Approach to Building Self-Adapting Systems
The use of handheld networked devices to access information systems by people moving around is spreading rapidly. Systems being used in this way typically face dynamic variation in...
Svein O. Hallsteinsen, Jacqueline Floch, Erlend St...
WSNA
2003
ACM
14 years 2 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
NOMS
2010
IEEE
172views Communications» more  NOMS 2010»
13 years 7 months ago
ROCS: a remotely provisioned OSGi framework for ambient systems
—One of the challenges of ambient systems lies in providing all the available services of the environment to the ambient devices, even if they do not physically host those servic...
Stéphane Frénot, Noha Ibrahim, Fr&ea...
WWW
2004
ACM
14 years 9 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...
CCS
2008
ACM
13 years 11 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis