Sciweavers

1597 search results - page 79 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
ACSAC
1998
IEEE
14 years 2 months ago
An Architecture for Intrusion Detection Using Autonomous Agents
The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency...
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D....
ECOOP
2003
Springer
14 years 3 months ago
Open APIs for Embedded Security
Abstract. Embedded computer control is increasingly common in appliances, vehicles, communication devices, medical instruments, and many other systems. Some embedded computer syste...
Carl A. Gunter
PERCOM
2007
ACM
14 years 9 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
HICSS
2005
IEEE
121views Biometrics» more  HICSS 2005»
14 years 3 months ago
Java Architectures for Mobilised Enterprise Systems
The coming generation of mobile phones will enable objects from enterprise systems to be distributed across a range of devices of different scales. This object mobility will provi...
David Parsons
IJNSEC
2008
160views more  IJNSEC 2008»
13 years 10 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler