Sciweavers

1491 search results - page 276 / 299
» Wireless Internet Service Development
Sort
View
ISADS
1999
IEEE
14 years 22 days ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
APNOMS
2006
Springer
14 years 5 days ago
A Zeroconf Approach to Secure and Easy-to-Use Remote Access to Networked Appliances
In this paper, we propose a new approach to secure and easy-to-use remote access to networked appliances (NAs). Based on the proposed approach, we develop a system in which servers...
Kiyohito Yoshihara, Toru Maruta, Hiroki Horiuchi
ECEH
2006
101views Healthcare» more  ECEH 2006»
13 years 9 months ago
Towards European Patient Summaries based on Triple Space Computing
: Medical practice today still entails sorting through scattered information on a specific patient. Making things more difficult, the EU, in bringing its member states closer toget...
Dario Cerizza, Emanuele Della Valle, Doug Foxvog, ...
FLAIRS
2003
13 years 9 months ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
HPCC
2010
Springer
13 years 9 months ago
Scheduling and Queue Management for Multi-class Traffic in Access Router of Mobility Protocol
The traffic characteristics in recent years have changed considerably having more video and audio traffic with critical real-time constraints. This situation is compounded by the i...
Md. Shohrab Hossain, Mohammed Atiquzzaman, William...