Sciweavers

1373 search results - page 74 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
IWCMC
2006
ACM
14 years 2 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
MOBICOM
1997
ACM
14 years 7 days ago
Dynamic Network Reconfiguration Support for Mobile Computers
Hot swapping technology combined with pervasive heterogeneous networks empowers mobile laptop users to select the best network device for their current environment. Unfortunately,...
Jon Inouye, Jim Binkley, Jonathan Walpole
IEEEARES
2007
IEEE
14 years 3 months ago
On the use of one-way chain based authentication protocols in secure control systems
The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial ...
Bogdan Groza, Toma-Leonida Dragomir
WOA
2003
13 years 10 months ago
Towards the Improvement of Monitoring and Control Agencies through Knowledge-Based Approaches
Abstract—This paper illustrates how the functionalities of monitoring/control systems, within an agent–based framework, can be improved by the adoption of Knowledge–Based tec...
Matteo Palmonari, Fabio Sartori
JNW
2006
94views more  JNW 2006»
13 years 8 months ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang