Sciweavers

2673 search results - page 56 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
ICNP
1999
IEEE
14 years 4 days ago
Automated Protocol Implementations Based on Activity Threads
In this paper we present a new approach for the automated mapping of formal descriptions into activity thread implementations. Our approach resolves semantic conflicts by reorderi...
Peter Langendörfer, Hartmut König
NDSS
2005
IEEE
14 years 1 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
CARDIS
2006
Springer
101views Hardware» more  CARDIS 2006»
13 years 11 months ago
Smartcard Firewalls Revisited
Smartcards are being used as secure endpoints in computer transactions. Recently, the connectivity of smartcards has increased and future smartcards will be able to communicate ove...
Henrich Christopher Pöhls, Joachim Posegga
SENSYS
2004
ACM
14 years 1 months ago
Simulating the power consumption of large-scale sensor network applications
Developing sensor network applications demands a new set of tools to aid programmers. A number of simulation environments have been developed that provide varying degrees of scala...
Victor Shnayder, Mark Hempstead, Bor-rong Chen, Ge...
ITIIS
2008
91views more  ITIIS 2008»
13 years 7 months ago
Towards a Server-Centric Interaction Architecture for Wireless Applications
Traditional web-based services that require users to browse via documents and fill out forms, are difficult to use with mobile devices. Moreover, as the web paradigm assumes activ...
Jussi Saarinen, Tommi Mikkonen, Sasu Tarkoma, Jani...