Sciweavers

347 search results - page 36 / 70
» On private computation in incomplete networks
Sort
View
PERCOM
2004
ACM
14 years 7 months ago
Modelling and Using Imperfect Context Information
Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate ac...
Karen Henricksen, Jadwiga Indulska
WS
2004
ACM
14 years 1 months ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras
ICN
2005
Springer
14 years 1 months ago
A Practical and Secure Communication Protocol in the Bounded Storage Model
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a un...
Erkay Savas, Berk Sunar
DANCE
2002
IEEE
14 years 20 days ago
The RadioActive Networking Architecture
This paper describes the activities in Application Level Active Networks (ALAN) under the DARPA-funded RADIOACTIVE Project; this is closely related to work carried out under a Eur...
Peter T. Kirstein, Piers O'Hanlon, Ken Carlberg, P...
DSN
2004
IEEE
13 years 11 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda