Sciweavers

731 search results - page 66 / 147
» Special Section on Information and Communication System Secu...
Sort
View
MOBIHOC
2003
ACM
14 years 8 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
DGO
2004
129views Education» more  DGO 2004»
13 years 10 months ago
Spatial Technologies for Coastal Management
This demonstration will be presented at the 2004 National Conference on Digital Government Research. The third year results of the project "Digitalization of Coastal Manageme...
Xutong Niu, Xian Xu, Alok Srivastava, Chung-yen Ku...
JAISE
2010
169views Algorithms» more  JAISE 2010»
13 years 3 months ago
Responsive environments: User experiences for ambient intelligence
In this paper we review the emerging field of responsive environments as an ambient intelligence system with a focus on user experience. We see responsive environments as a combina...
Jorge Alves Lino, Benjamin Salem, Matthias Rauterb...
STORAGESS
2005
ACM
14 years 2 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
14 years 3 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...