Sciweavers

8655 search results - page 295 / 1731
» Challenges for Trusted Computing
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
15 years 3 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
103
Voted
IJMI
2007
134views more  IJMI 2007»
15 years 3 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
JCIT
2007
142views more  JCIT 2007»
15 years 3 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
144
Voted
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 3 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
ER
2010
Springer
135views Database» more  ER 2010»
15 years 1 months ago
Adaptation in Open Systems: Giving Interaction Its Rightful Place
Abstract. We address the challenge of adaptation in open systems. Open systems are characterized by interactions among autonomous and heterogeneous participants. In such systems, e...
Fabiano Dalpiaz, Amit K. Chopra, Paolo Giorgini, J...