Sciweavers

1407 search results - page 62 / 282
» Systems Theory Model for Information Security
Sort
View
JSAC
2006
181views more  JSAC 2006»
13 years 8 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
DESRIST
2009
Springer
135views Education» more  DESRIST 2009»
13 years 11 months ago
Towards a design theory for online communities
Online communities are increasingly important in modern social life. Yet, the diverse collection of guidelines that have directed online community design may not be keeping pace w...
David Gurzick, Wayne G. Lutters
TCOM
2010
141views more  TCOM 2010»
13 years 2 months ago
Mutual Information Statistics and Beamforming Performance Analysis of Optimized LoS MIMO Systems
Abstract--This paper provides a systematic mutual information (MI) and multichannel beamforming (MBF) characterization of optimized multiple-input multiple-output (MIMO) communicat...
Michail Matthaiou, Paul de Kerret, George K. Karag...
ECIS
2004
13 years 9 months ago
What should the business know about information systems?
This paper presents an exploratory study of Information Systems (IS) competencies of business managers in Europe. Following resource-based theory and a knowledge-based view of IS ...
Salvador Aragon, Ryan R. Peterson
CCS
2010
ACM
13 years 8 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov