Sciweavers

334 search results - page 53 / 67
» trust 2010
Sort
View
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 10 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
ER
2010
Springer
135views Database» more  ER 2010»
13 years 8 months ago
Adaptation in Open Systems: Giving Interaction Its Rightful Place
Abstract. We address the challenge of adaptation in open systems. Open systems are characterized by interactions among autonomous and heterogeneous participants. In such systems, e...
Fabiano Dalpiaz, Amit K. Chopra, Paolo Giorgini, J...
ENTCS
2008
390views more  ENTCS 2008»
13 years 8 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
IAJIT
2010
157views more  IAJIT 2010»
13 years 8 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
IAJIT
2010
133views more  IAJIT 2010»
13 years 8 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa