Sciweavers

452 search results - page 74 / 91
» Is home network application acceptable or not
Sort
View
AINA
2007
IEEE
14 years 1 months ago
Pervasive Computing with Frugal Objects
— This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a stron...
Benoît Garbinato, Rachid Guerraoui, Jarle Hu...
IPPS
2007
IEEE
14 years 1 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ESAS
2007
Springer
14 years 1 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
AINA
2009
IEEE
14 years 19 days ago
DAVO: A Domain-Adaptable, Visual BPEL4WS Orchestrator
The Business Process Execution Language for Web Services (BPEL4WS) is the de facto standard for the composition of web services into complex, valued-added workflows in both indus...
Tim Dörnemann, Markus Mathes, Roland Schwarzk...
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 9 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani