Sciweavers

1822 search results - page 141 / 365
» GENI Design Principles
Sort
View
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt
XPU
2004
Springer
15 years 9 months ago
The Oregon Software Development Process
Abstract. User participation is still a difficult topic in software development. Based on the results of the Oregon experiment in construction we propose a novel development proces...
Till Schümmer, Robert Slagter
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 9 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory
IPPS
2002
IEEE
15 years 8 months ago
A Middleware for Large Scale Networks Inspired by the Immune System
Very large scale networks such as the Internet require a new operational model to use resources efficiently and reduce the need for the administration necessary in clientserver n...
Mohamed Bakhouya, Jaafar Gaber, Abder Koukam
CHES
2001
Springer
98views Cryptology» more  CHES 2001»
15 years 8 months ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two...
Mike Bond