Sciweavers

5665 search results - page 971 / 1133
» Introduction to Computer Security
Sort
View
118
Voted
WCNC
2010
IEEE
15 years 6 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
94
Voted
GI
2007
Springer
15 years 6 months ago
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme
: A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for a benefit (some good or service). Recently, Chen et al. [CEL+ 07] prop...
Alberto N. Escalante, Hans Löhr, Ahmad-Reza S...
ACSC
2004
IEEE
15 years 6 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald
APNOMS
2006
Springer
15 years 6 months ago
A Framework Supporting Quality of Service for SOA-Based Applications
Web Services and Service-Oriented Architecture (SOA) has been playing an important role as a middleware for interoperable transactions such as Business-to-Business and Enterprise A...
Phung Huu Phu, Dae Seung Yoo, Myeongjae Yi
CCGRID
2004
IEEE
15 years 6 months ago
A Java-based programming environment for hierarchical Grid: Jojo
Despite recent developments in higher-level middleware for the Grid supporting high level of ease-of-programming, hurdles for widespread adoption of Grids remain high, due to (1) ...
Hidemoto Nakada, Satoshi Matsuoka