Sciweavers

12183 search results - page 83 / 2437
» Computers under Attacks!
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
ACMSE
2009
ACM
15 years 2 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
COMMA
2010
14 years 11 months ago
Moving Between Argumentation Frameworks
Abstract argument frameworks have been used for various applications within multi-agent systems, including reasoning and negotiation. Different argument frameworks make use of diff...
Nir Oren, Chris Reed, Michael Luck