Sciweavers

2979 search results - page 286 / 596
» Modelling secure multiagent systems
Sort
View
SAC
2010
ACM
15 years 11 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
IEEEARES
2006
IEEE
15 years 11 months ago
A Component Based Software Architecture for E-Government Applications
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
Daniel Beer, Raphael Kunis, Gudula Rünger
MASA
2001
Springer
15 years 9 months ago
Distributed Shared Agent Representations
Abstract 1 Different definitions of agents use concepts such as autonomy, pro-activity, reactivity, social abilities, and intentional models. Very few (if any), however, refer to...
Frances M. T. Brazier, Maarten van Steen, Niek J. ...
TITS
2010
201views Education» more  TITS 2010»
14 years 11 months ago
A Review of the Applications of Agent Technology in Traffic and Transportation Systems
The agent computing paradigm is rapidly emerging as one of the powerful technologies for the development of largescale distributed systems to deal with the uncertainty in a dynamic...
Bo Chen, Harry H. Cheng
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
15 years 9 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...