Sciweavers

356 search results - page 2 / 72
» The End of End-to-End Security
Sort
View
WCNC
2010
IEEE
13 years 6 months ago
End-To-End HARQ in Cognitive Radio Networks
Abstract—Cognitive radio networks (CRN) may greatly enhance the throughput based on a given bandwidth. CRN has a unique feature, consisting of uni-directional opportunistic wirel...
Weng-Chon Ao, Kwang-Cheng Chen
IJIPM
2010
60views more  IJIPM 2010»
13 years 3 months ago
A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid
Weifeng Sun, Juanyun Wang, Boxiang Dong, Mingchu L...
IEEESP
2006
66views more  IEEESP 2006»
13 years 8 months ago
The End of End-to-End Security?
Scott Bradner
SOUPS
2009
ACM
14 years 3 months ago
Privacy stories: confidence in privacy behaviors through end user programming
Luke Church, Jonathan Anderson, Joseph Bonneau, Fr...
HOTOS
2007
IEEE
14 years 12 days ago
End-to-End Web Application Security
Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-toend argument that the ...
Úlfar Erlingsson, V. Benjamin Livshits, Yin...