Sciweavers

58 search results - page 12 / 12
» Cryptography and competition policy: issues with 'trusted co...
Sort
View
WS
2005
ACM
13 years 10 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
SACMAT
2011
ACM
12 years 8 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
DGO
2004
108views Education» more  DGO 2004»
13 years 6 months ago
A Project to Assess Voting Technology and Ballot Design
The interdisciplinary project uses a variety of research designs, data collection methodologies, and analysis techniques and two ballot designs to assess five commercially availab...
Paul S. Herrnson, Richard G. Niemi, Benjamin B. Be...