Sciweavers

722 search results - page 71 / 145
» Offering Mobile Security as a Service
Sort
View
IJNSEC
2008
140views more  IJNSEC 2008»
14 years 10 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
NTMS
2009
IEEE
15 years 4 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
ICEB
2004
279views Business» more  ICEB 2004»
14 years 11 months ago
Adaptive User Interfaces for Intelligent E-Learning: Issues and Trends
Adaptive User Interfaces have a long history rooted in the emergence of such eminent technologies as Artificial Intelligence, Soft Computing, Graphical User Interface, JAVA, Inter...
Abdul Rahim Ahmad, Otman A. Basir, Khaled Hassanei...
SKG
2006
IEEE
15 years 3 months ago
A Semantic-based Meteorology Grid Service Registry, Discovery and Composition Framework
Meteorology Grid Computing aims to provide scientist with seamless, reliable, secure and inexpensive access to meteorological resources. In this paper, we presented a semantic-bas...
Kaijun Ren, Nong Xiao, Junqiang Song, Weimin Zhang...
JPDC
2006
141views more  JPDC 2006»
14 years 9 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...