Sciweavers

948 search results - page 86 / 190
» Making a Game of Network Security
Sort
View
JOT
2006
80views more  JOT 2006»
14 years 10 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
AE
2001
Springer
15 years 2 months ago
Evolving Objects: A General Purpose Evolutionary Computation Library
This paper presents the evolving objects library (EOlib), an object-oriented framework for evolutionary computation (EC) that aims to provide a flexible set of classes to build EC...
Maarten Keijzer, Juan J. Merelo Guervós, Gu...
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
14 years 10 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
HPDC
2005
IEEE
15 years 3 months ago
CODO: firewall traversal by cooperative on-demand opening
Firewalls and network address translators (NATs) cause significant connectivity problems along with benefits such as network protection and easy address planning. Connectivity pro...
Se-Chang Son, Bill Allcock, Miron Livny
IJSN
2006
116views more  IJSN 2006»
14 years 10 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...