Sciweavers

510 search results - page 63 / 102
» Security issues in control, management and routing protocols
Sort
View
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 2 months ago
The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...
MDM
2010
Springer
194views Communications» more  MDM 2010»
13 years 9 months ago
Timing and Radius Considerations for Maintaining Connectivity QoS
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
SECURWARE
2008
IEEE
14 years 2 months ago
Email Worm Mitigation by Controlling the Name Server Response Rate
Email worms and the spam associated with them are one of the main operational security issues today because they waste time, money and resources. The high incidence of email worms...
Nikolaos Chatzis, Enric Pujol
MATES
2005
Springer
14 years 1 months ago
Semantic Methods for P2P Query Routing
Knowledge sharing in a virtual organization requires a knowledge life cycle including knowledge provisioning, terminology alignment, determination of resource location, query routi...
Alexander Löser, Steffen Staab, Christoph Tem...
ICMB
2006
IEEE
206views Business» more  ICMB 2006»
14 years 1 months ago
E-Pass Using DRM in Symbian v8 OS and TrustZone : Securing Vital Data on Mobile Devices
The mobile phone industry has established a large customer base market, providing a wide range of mobile applications from voice and data services to digital media such as digital...
Wan Huzaini Wan Hussin, Reuben Edwards, Paul Coult...