Sciweavers

194 search results - page 31 / 39
» Bootstrapping in Peer-to-Peer Systems
Sort
View
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 3 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
JCDL
2010
ACM
154views Education» more  JCDL 2010»
15 years 2 months ago
Transferring structural markup across translations using multilingual alignment and projection
We present here a method for automatically projecting structural information across translations, including canonical citation structure (such as chapters and sections), speaker i...
David Bamman, Alison Babeu, Gregory Crane
NDSS
2002
IEEE
15 years 2 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
ECOOPW
1997
Springer
15 years 1 months ago
Semantics Through Pictures
An object-oriented (OO) model has a static component, the set of allowable snapshots or system states, and a dynamic component, the set of filmstrips or sequences of snapshots. Dia...
Stuart Kent, Ali Hamie, John Howse, Franco Civello...
IFIP
1994
Springer
15 years 1 months ago
E-mail as an Enabling Technology in Brazil: The CNPq/ProTeM-CC Experience
Development of a research project in Computer Science, integrating a considerable number of research institutions and about 1200 individual researchers all over a country with big...
José Palazzo M. de Oliveira, Norberto Hoppe...