Sciweavers

162 search results - page 23 / 33
» The Design of a Trustworthy Voting System
Sort
View
EUROMICRO
2004
IEEE
14 years 1 months ago
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks
The class of wireless and mobile networks features a dissimilar set of characteristics and constraints compared to traditional fixed networks. The various dimensions of these char...
Matthias Hollick, Ivan Martinovic, Tronje Krop, Iv...
CAISE
2008
Springer
13 years 11 months ago
Extended Kaos to Support Variability for Goal Oriented Requirements Reuse
This work is done as part of the Tacos project1 whose aims is to define a component-based approach to specify trustworthy systems from the requirements phase to the specification p...
Farida Semmak, Christophe Gnaho, Régine Lal...
ATAL
2007
Springer
13 years 11 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 9 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
CSB
2003
IEEE
121views Bioinformatics» more  CSB 2003»
14 years 3 months ago
Epitope Prediction Algorithms for Peptide based Vaccine Design
Peptide-based vaccines, in which small peptides derived from target proteins (epitopes) are used to provoke an immune reaction, have attracted considerable attention recently as a...
Liliana Florea, Bjarni V. Halldórsson, Oliv...