Sciweavers

5475 search results - page 1055 / 1095
» Model Driven Security
Sort
View
TWC
2008
138views more  TWC 2008»
15 years 12 days ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
TWC
2008
176views more  TWC 2008»
15 years 12 days ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
CORR
2004
Springer
142views Education» more  CORR 2004»
15 years 11 days ago
Global Grids and Software Toolkits: A Study of Four Grid Middleware Technologies
: Grid is an infrastructure that involves the integrated and collaborative use of computers, networks, databases and scientific instruments owned and managed by multiple organizati...
Parvin Asadzadeh, Rajkumar Buyya, Chun Ling Kei, D...
CCR
2002
111views more  CCR 2002»
15 years 10 days ago
A taxonomy and design considerations for Internet accounting
Economic principles are increasingly being suggested for addressing some complex issues related to distributed resource allocation for QoS (Quality of Service) enhancement. Many p...
Michel Kouadio, Udo W. Pooch
79
Voted
DEBU
2000
90views more  DEBU 2000»
15 years 10 days ago
Personal Views for Web Catalogs
Large growth in e-commerce has culiminated in technology boom to enable companies to better serve their consumers. The front-end of the e-commerce business is to better reach the ...
Kajal T. Claypool, Li Chen, Elke A. Rundensteiner
« Prev « First page 1055 / 1095 Last » Next »