Sciweavers

2024 search results - page 37 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
JSW
2007
147views more  JSW 2007»
15 years 4 months ago
Towards Secure e-Learning Applications: a Multiagent Platform
—This paper presents some results in the intersection of three technological fields: e-learning, multiagent systems, and standards to improve the development of secure systems. T...
Carine G. Webber, Maria de Fátima Webber do...
ISSE
2006
15 years 4 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
ESAS
2004
Springer
15 years 9 months ago
Secure Overlay for Service Centric Wireless Sensor Networks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided b...
Hans-Joachim Hof, Erik-Oliver Blaß, Martina ...
IWAN
2000
Springer
15 years 8 months ago
The Active Process Interaction with Its Environment
Adding programmability to the interior of the network provides an infrastructure for distributed applications. Speci
Jessica A. Kornblum, Danny Raz, Yuval Shavitt
AMW
2010
15 years 5 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos