Sciweavers

18 search results - page 3 / 4
» The Performance of OPC-UA Security Model at Field Device Lev...
Sort
View
WS
2005
ACM
14 years 28 days ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble
IJIEM
2007
113views more  IJIEM 2007»
13 years 7 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
CHES
2004
Springer
106views Cryptology» more  CHES 2004»
13 years 11 months ago
XTR Implementation on Reconfigurable Hardware
Abstract. Recently, Lenstra and Verheul proposed an efficient cryptosystem called XTR. This system represents elements of F p6 with order dividing p2 -p+1 by their trace over Fp2 ....
Eric Peeters, Michael Neve, Mathieu Ciet
OOPSLA
2000
Springer
13 years 11 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
EUSAI
2004
Springer
13 years 11 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...