Sciweavers

ITCC
2005
IEEE
13 years 10 months ago
Pareto-Optimal Hardware for Substitution Boxes
: In this paper, we propose a methodology based on genetic programming to automatically generate hardware designs of substitution boxes necessary for many cryptosystems such as DES...
Nadia Nedjah, Luiza de Macedo Mourelle
ITCC
2005
IEEE
13 years 10 months ago
An Aspect-Oriented Approach to Mobile Agent Access Control
This paper presents an aspect-oriented approach to access control in mobile agent systems, where a multipoint security check mechanism visualizes the services of a host as individ...
Dianxiang Xu, Vivek Goel
ITCC
2005
IEEE
13 years 10 months ago
An Analysis of Notification Related Specifications for Web/Grid Applications
Notification is especially important in the Service Oriented Architecture (SOA) model engendered by Web Services. where Web Services interact with each other through the exchange ...
Shrideep Pallickara, Geoffrey Fox
ITCC
2005
IEEE
13 years 10 months ago
Comparison of Information Technology Adoption Rates across Laggards, Innovators and Others
It is important to predict and analyze user acceptance of information technology in order to address success and failures of technological products. The Theory of Reasoned Action ...
Rukmini Reddy Muduganti, Shravan Kumar Sogani, Hen...
ITCC
2005
IEEE
13 years 10 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
ITCC
2005
IEEE
13 years 10 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
ITCC
2005
IEEE
13 years 10 months ago
Ad Hoc Key Management Infrastructure
Brian Lehane, Linda Doyle, Donal O'Mahony
ITCC
2005
IEEE
13 years 10 months ago
Watermark Based Digital Rights Management
Piyali Mandal, Ashish Thakral, Shekhar Verma
ITCC
2005
IEEE
13 years 10 months ago
NIPPERS: Network of InterPolated PeERS for Web Service Discovery
Web services are becoming an important enabler of the Semantic Web. Besides the need for a rich description mechanism, Web Service information should be made available in an acces...
Christos Makris, Evangelos Sakkopoulos, Spyros Sio...