Sciweavers

617 search results - page 60 / 124
» Research Challenges for the Security of Control Systems
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 3 months ago
A Decentralized Key Management Scheme in Overlay Multicast Network
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time st...
Xingfeng Guo, Xiaodong Liu, Qionghai Dai
TASE
2008
IEEE
13 years 9 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
ISSA
2004
13 years 10 months ago
An Investigation Into Access Control For Mobile Devices
Mobile devices, such as mobile phones, are becoming multi-purpose devices. These devices are capable of storing data as well as running custom applications. As more people adopt t...
Stephen Perelson
GD
2008
Springer
13 years 10 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
ENVSOFT
2006
118views more  ENVSOFT 2006»
13 years 9 months ago
Database architectures: Current trends and their relationships to environmental data management
Ever increasing environmental demands from customers, authorities and governmental organizations as well as new business control functions are integrated to environmental manageme...
Jaroslav Pokorný