Sciweavers

1019 search results - page 177 / 204
» Cryptographic Design Vulnerabilities
Sort
View
PDCAT
2005
Springer
15 years 5 months ago
Optimal Routing in a Small-World Network
Recently a bulk of research [14, 5, 15, 9] has been done on the modelling of the smallworld phenomenon, which has been shown to be pervasive in social and nature networks, and eng...
Jianyang Zeng, Wen-Jing Hsu
JIT
2004
Springer
131views Database» more  JIT 2004»
15 years 5 months ago
Testing of Service-Oriented Architectures - A Practical Approach
Service Oriented Architectures (SOAs) have recently emerged as a new promising paradigm for supporting distributed computing. Web services, as well as integration-packages relying ...
Schahram Dustdar, Stephan Haslinger
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 5 months ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman
INFOCOM
2003
IEEE
15 years 5 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
IPSN
2003
Springer
15 years 5 months ago
A Robust Data Delivery Protocol for Large Scale Sensor Networks
Although data forwarding algorithms and protocols have been among the first set of issues explored in sensor networking, how to reliably deliver sensing data through a vast field...
Fan Ye, Gary Zhong, Songwu Lu, Lixia Zhang