Sciweavers

2337 search results - page 379 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
14 years 2 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
MSWIM
2005
ACM
14 years 2 months ago
Cellular universal IP: a low delay mobility scheme based on universal IP addressing
The concept of care-of-address (CoA) is a major cause of excessive handoff delay in Mobile IPv6 for real time multimedia traffic. Many schemes eliminate the use of CoA at the micr...
Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee
VIZSEC
2005
Springer
14 years 2 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
ACMSE
2007
ACM
14 years 1 months ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...
ISPAN
2005
IEEE
14 years 2 months ago
A Self-stabilizing Link-Cluster Algorithm in Mobile Ad Hoc Networks
We design a self-stabilizing cluster routing algorithm based on the link-cluster architecture of wireless ad hoc networks. The network is divided into clusters. Each cluster has a...
Doina Bein, Ajoy Kumar Datta, Chakradhar R. Jaggan...