Sciweavers

313 search results - page 56 / 63
» Efficient Implementation of XML Security for Mobile Devices
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Multi-vendor penetration testing in the advanced metering infrastructure
- The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy...
Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Mia...
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 3 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
ICDCS
2003
IEEE
15 years 3 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
EUROSSC
2008
Springer
14 years 11 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...
COMCOM
2010
129views more  COMCOM 2010»
14 years 10 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...