Sciweavers

1180 search results - page 127 / 236
» Interaction Protocols in Agentis
Sort
View
86
Voted
ECBS
2009
IEEE
120views Hardware» more  ECBS 2009»
15 years 7 months ago
Tuning Complex Sensornet Systems Using Principled Engineering Methods
Sensornet lifespan and utility is limited by the energy resources of individual motes. Network designers seek to maximise energy efficiency while maintaining acceptable Quality o...
Jonathan Tate, Iain Bate
116
Voted
AINA
2007
IEEE
15 years 7 months ago
Building Web-Base SIP Analyzer with Ajax Approach
Web applications are generally less interactive than desktop applications. Due to the simple request-response model between web browsers and web servers, users usually experience ...
Quincy Wu, Yan-Hsiang Wang
PERVASIVE
2007
Springer
15 years 6 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
WECWIS
2005
IEEE
116views ECommerce» more  WECWIS 2005»
15 years 6 months ago
Security and Privacy Using One-Round Zero-Knowledge Proofs
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal wi...
Sultan Almuhammadi, Clifford Neuman
97
Voted
FSTTCS
2004
Springer
15 years 6 months ago
A Calculus for Trust Management
We introduce ctm, a process calculus which embodies a notion of trust for global computing systems. In ctm each principal (location) is equipped with a policy, which determines its...
Marco Carbone, Mogens Nielsen, Vladimiro Sassone