Sciweavers

6122 search results - page 1168 / 1225
» Securing network access in wireless sensor networks
Sort
View
MOBIDE
2003
ACM
14 years 2 months ago
XML three-way merge as a reconciliation engine for mobile data
Optimistic replication approaches are often employed on mobile devices, which raises the need for reconciliation of concurrently modified data. We propose that three-way merging ...
Tancred Lindholm
CCGRID
2006
IEEE
14 years 14 days ago
Efficient Many-to-One Communication for a Distributed RAID
Any set of autonomous workstations, however networked (by a LAN, a MAN, or wireless), can be seen as a collection of networked low cost disks. Such a collection can be operated by...
Alessandro Di Marco, Giuseppe Ciaccio
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 2 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
ICCSA
2005
Springer
14 years 2 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
ICIAR
2005
Springer
14 years 2 months ago
Digital Video Scrambling Using Motion Vector and Slice Relocation
As digitalized content rapidly proliferates in networked systems, content security necessarily arises as one of the most important issues. Many developers have studied techniques ...
Sang Gu Kwon, Woong Il Choi, Byeungwoo Jeon
« Prev « First page 1168 / 1225 Last » Next »