Sciweavers

3751 search results - page 555 / 751
» Events in security protocols
Sort
View
OOPSLA
1995
Springer
15 years 4 months ago
How and Why to Encapsulate Class Trees
eusable framework, pattern or module interface usually is represented by abstract They form an abstract design and leave the implementation to concrete subclasses. ract design is ...
Dirk Riehle
ATC
2006
Springer
15 years 2 months ago
Managing Trust in Distributed Agent Systems
Abstract. Software agent technology has attracted much attention for developing various distributed systems, composed of autonomous agents interacting with one another using partic...
Stephen S. Yau
DRMTICS
2005
Springer
15 years 2 months ago
A Novel Framework for Multiple Creatorship Protection of Digital Movies
A digital movie can be created jointly under the cooperation of many creators. It is then necessary to provide protection to the creatorship of each participating creator. In this ...
Yu-Quan Zhang, Sabu Emmanuel
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 2 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
116
Voted
WMI
2001
147views more  WMI 2001»
15 years 2 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...