Sciweavers

212 search results - page 19 / 43
» Foundations of Group Signatures: The Case of Dynamic Groups
Sort
View
JALC
2006
87views more  JALC 2006»
14 years 11 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
ICICS
2005
Springer
15 years 5 months ago
PCAV: Internet Attack Visualization on Parallel Coordinates
This paper presents PCAV (Parallel Coordinates Attack Visualizer), a real-time visualization system for detecting large-scale Internet attacks including Internet worms, DDoS attack...
Hyunsang Choi, Heejo Lee
MDM
2005
Springer
15 years 5 months ago
Concept-based discovery of mobile services
In this paper, we consider semantic service discovery in a global computing environment. We propose creating a dynamic overlay network by grouping together semantically related se...
Chara Skouteli, George Samaras, Evaggelia Pitoura
BICOB
2009
Springer
15 years 6 months ago
Association Analysis Techniques for Bioinformatics Problems
Association analysis is one of the most popular analysis paradigms in data mining. Despite the solid foundation of association analysis and its potential applications, this group o...
Gowtham Atluri, Rohit Gupta, Gang Fang, Gaurav Pan...
IJSN
2006
140views more  IJSN 2006»
14 years 11 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi