Sciweavers

330 search results - page 20 / 66
» SKMA: a key management architecture for SCADA systems
Sort
View
NOMS
2000
IEEE
131views Communications» more  NOMS 2000»
14 years 2 months ago
Provision of global number portability using CORBA
Global Number Portability (GNP) is becoming a key service to increase competition and profit of a service provider for the ever-growing telephone marketplace. In this paper, we pr...
Kyu-Hyung Kim, Dong-Hee Lee, Eun-Ju Ha, Jong-Tae P...
SRDS
2006
IEEE
14 years 4 months ago
A Scalable Services Architecture
Data centers constructed as clusters of inexpensive machines have compelling cost-performance benefits, but developing services to run on them can be challenging. This paper repo...
Tudor Marian, Ken Birman, Robbert van Renesse
DAC
2010
ACM
14 years 2 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
MIDDLEWARE
2005
Springer
14 years 3 months ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...
ICON
2007
IEEE
14 years 4 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...