Sciweavers

216 search results - page 31 / 44
» Question-based group authentication
Sort
View
CSE
2009
IEEE
13 years 11 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
EURONGI
2008
Springer
13 years 9 months ago
Secure and Efficient Data Collection in Sensor Networks
Sensor networks are a very specific type of wireless networks where both security and performance issues need to be solved efficiently in order to avoid manipulations of the sensed...
Cristina Cano, Manel Guerrero, Boris Bellalta
ICONIP
2007
13 years 9 months ago
Adaptive Spiking Neural Networks for Audiovisual Pattern Recognition
Abstract. The paper describes the integration of brain-inspired systems to perform audiovisual pattern recognition tasks. Individual sensory pathways as well as the integrative mod...
Simei Gomes Wysoski, Lubica Benuskova, Nikola Kasa...
CSREASAM
2003
13 years 9 months ago
Defending Against Denial of Service Attacks Using Secure Name Resolution
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...
Prashant Dewan, Partha Dasgupta, Vijay Karamcheti
LISA
2000
13 years 9 months ago
Pelendur: Steward of the Sysadmin
Here we describe Pelendur, a system for the management of common system operation tasks. Specifically, Pelendur focuses on the management of user accounts and related information ...
Matt Curtin, Sandy Farrar, Tami King