Sciweavers

871 search results - page 47 / 175
» A Decentralized Authorization Architecture
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
CSREAEEE
2006
103views Business» more  CSREAEEE 2006»
14 years 11 months ago
Mobile Web Service Architecture for Software Development Peer Inspection
- Improving software quality remains a key challenge. Software development formal peer inspection has emerged as an effective approach to address this challenge. Software peer insp...
Gilda Pour, Ashwini Ramachandra, Panchali Sarkar
TDSC
2011
14 years 4 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
IEEEARES
2008
IEEE
15 years 4 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
HT
2005
ACM
15 years 3 months ago
StorySpinner: controlling narrative pace in hyperfiction
This paper describes the StorySpinner system, a sculptural hypertext reader used as a test bed for experimenting with the authoring of narrative flow in automatically generated st...
Clare J. Hooper, Mark J. Weal