Sciweavers

466 search results - page 56 / 94
» Practical declarative network management
Sort
View
SENSYS
2005
ACM
14 years 1 months ago
A unifying link abstraction for wireless sensor networks
ng Link Abstraction for Wireless Sensor Networks Joseph Polastre, Jonathan Hui, Philip Levis, Jerry Zhao, David Culler, Scott Shenker, and Ion Stoica Computer Science Department In...
Joseph Polastre, Jonathan Hui, Philip Levis, Jerry...
POLICY
2009
Springer
14 years 2 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
INFOSECCD
2006
ACM
14 years 1 months ago
Campus-wide spyware and virus removal as a method of teaching information security
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university’s network u...
Frank H. Katz
NDSS
2005
IEEE
14 years 1 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
ECIS
2000
13 years 9 months ago
Electronic Notary System and its Certification Mechanism
We have developed a prototype electronic notary system (CYNOS : CYber NOtary System). CYNOS proves facts by providing the evidence (notary token) of events and/or actions that cou...
Shinichi Nakahara