Sciweavers

8644 search results - page 1614 / 1729
» On the Composition of Secure Systems
Sort
View
ICDCS
2008
IEEE
14 years 4 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
ICIP
2008
IEEE
14 years 4 months ago
Fairness dynamics in multimedia colluders' social networks
Multimedia social network analysis is a research area with growing importance, in which the social network members share multimedia contents with all different purposes and analyz...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
SECURWARE
2008
IEEE
14 years 4 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...
WIMOB
2008
IEEE
14 years 4 months ago
Using LED Lighting for Ubiquitous Indoor Wireless Networking
—Wireless networking is currently dominated by radio frequency (RF) techniques. However, the soon-to-be ubiquity of LED-based lighting motivated by significant energy savings pro...
Thomas D. C. Little, Peter Dib, Kandarp Shah, Nick...
AINA
2007
IEEE
14 years 4 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
« Prev « First page 1614 / 1729 Last » Next »