Sciweavers

2897 search results - page 510 / 580
» Mobile Code Security
Sort
View
WCNC
2010
IEEE
14 years 2 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
ATAL
2006
Springer
14 years 1 months ago
Enhancing agent-oriented models with aspects
The modular representation of concerns is imperative in the design modeling of multi-agent systems (MASs). However, MAS designers typically face a number of concerns that inherent...
Alessandro F. Garcia, Christina Chavez, Ricardo Ch...
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
14 years 1 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
FTDCS
2004
IEEE
14 years 1 months ago
Self-Aware Distributed Embedded Systems
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secu...
Richard Pon, Maxim A. Batalin, Mohammad H. Rahimi,...
DLS
2005
101views Languages» more  DLS 2005»
14 years 4 days ago
Flexible object encapsulation for ambient-oriented programming
In the emerging field of Ambient Intelligence (AmI), software is deployed in wireless open networks of mobile devices. Such open networks require stringent security measures as u...
Wolfgang De Meuter, Éric Tanter, Stijn Most...