Sciweavers

762 search results - page 117 / 153
» Modeling and Simulating Information Security Management
Sort
View
PEWASUN
2004
ACM
14 years 1 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
CONTEXT
2007
Springer
14 years 1 months ago
Coping with Unconsidered Context of Formalized Knowledge
The paper focuses on a difficult problem when formalizing knowledge: What about the possible concepts that didn’t make it into the formalization? We call such concepts the uncons...
Stefan Mandl, Bernd Ludwig
DRM
2003
Springer
14 years 27 days ago
Breaking and repairing optimistic fair exchange from PODC 2003
In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already...
Yevgeniy Dodis, Leonid Reyzin
CONTEXT
2007
Springer
14 years 1 months ago
CAMOU: A Simple Integrated eLearning and Planning Techniques Tool
In this paper we present an educational tool which has been designed to manage (learning) knowledge acquired from the interactions with the students, and to automatically aids educ...
David Camacho, María Dolores Rodrígu...
CISS
2008
IEEE
14 years 2 months ago
Achieving network stability and user fairness through admission control of TCP connections
—This paper studies a network under TCP congestion control, in which the number of flows per user is explicitly taken into account. We present a control law for this variable th...
Andrés Ferragut, Fernando Paganini