Sciweavers

1365 search results - page 76 / 273
» Security applications of peer-to-peer networks
Sort
View
DSN
2007
IEEE
14 years 2 months ago
Reliability Techniques for RFID-Based Object Tracking Applications
Radio Frequency Identification (RFID) technology has the potential to dramatically improve numerous industrial practices. However, it still faces many challenges, including secur...
Ahmad Rahmati, Lin Zhong, Matti A. Hiltunen, Rittw...
ACSAC
1997
IEEE
13 years 11 months ago
An Efficient Message Authentication Scheme for Link State Routing
We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some ro...
S. Cheung
SP
2002
IEEE
226views Security Privacy» more  SP 2002»
13 years 7 months ago
Dynamic load balancing of SAMR applications on distributed systems
Dynamic load balancing(DLB) for parallel systems has been studied extensively; however, DLB for distributed systems is relatively new. To efficiently utilize computing resources p...
Zhiling Lan, Valerie E. Taylor, Greg Bryan
ESCIENCE
2006
IEEE
14 years 1 months ago
User Programmable Virtualized Networks
This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that ...
Robert J. Meijer, Rudolf J. Strijkers, Leon Gomman...
ICPPW
2006
IEEE
14 years 1 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed