Sciweavers

2108 search results - page 214 / 422
» Encrypted
Sort
View
121
Voted
IEEEARES
2006
IEEE
15 years 10 months ago
Secure Enhanced Wireless Transfer Protocol
When IEEE 802.11i draft[1] proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage se...
Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang
AOSD
2006
ACM
15 years 10 months ago
Doxpects: aspects supporting XML transformation interfaces
In the web services environment software development can involve writing both object-oriented programs and XML transformations. This can be seen in the popular Web Services archit...
Eric Wohlstadter, Kris De Volder
139
Voted
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
15 years 9 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
DATE
2005
IEEE
82views Hardware» more  DATE 2005»
15 years 9 months ago
Energy-Aware Routing for E-Textile Applications
As the scale of electronic devices shrinks, “electronic textiles” (e-textiles) will make possible a wide variety of novel applications which are currently unfeasible. Due to t...
Jung-Chun Kao, Radu Marculescu
148
Voted
HICSS
2005
IEEE
161views Biometrics» more  HICSS 2005»
15 years 9 months ago
Data Assurance in a Conventional File Systems
The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goa...
Sasa Rudan, Aleksandra Kovacevic, Charles A. Milli...