Sciweavers

948 search results - page 86 / 190
» Making a Game of Network Security
Sort
View
JOT
2006
80views more  JOT 2006»
15 years 1 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
AE
2001
Springer
15 years 6 months ago
Evolving Objects: A General Purpose Evolutionary Computation Library
This paper presents the evolving objects library (EOlib), an object-oriented framework for evolutionary computation (EC) that aims to provide a flexible set of classes to build EC...
Maarten Keijzer, Juan J. Merelo Guervós, Gu...
100
Voted
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 1 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
HPDC
2005
IEEE
15 years 7 months ago
CODO: firewall traversal by cooperative on-demand opening
Firewalls and network address translators (NATs) cause significant connectivity problems along with benefits such as network protection and easy address planning. Connectivity pro...
Se-Chang Son, Bill Allcock, Miron Livny
IJSN
2006
116views more  IJSN 2006»
15 years 1 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...