Sciweavers

5741 search results - page 24 / 1149
» Accessibility in oriented networks
Sort
View
AUSFORENSICS
2003
14 years 11 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
71
Voted
IJNSEC
2008
103views more  IJNSEC 2008»
14 years 9 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
63
Voted
MOBIHOC
2008
ACM
15 years 9 months ago
Poster abstract: scalable and collaborative internet access for opportunistic people networks
Ling-Jyh Chen, Ting-Kai Huang, Che-Liang Chiou
SOCO
2007
Springer
15 years 3 months ago
Aspect-Oriented Programming: Selecting and Exposing Object Paths
Aspects require access to the join point context in order to select and adapt join points. For this purpose, current aspect-oriented systems offer a large number of pointcut constr...
Mohammed Al-Mansari, Stefan Hanenberg, Rainer Unla...