Sciweavers

3486 search results - page 517 / 698
» On the Design and Security of RC2
Sort
View
EGC
2005
Springer
15 years 5 months ago
Grid Access Middleware for Handheld Devices
Abstract. Grid technology attempts to support flexible, secure, coordinated information sharing among dynamic collections of individuals, institutions, and resources. The use of G...
Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee, Tae...
EUC
2005
Springer
15 years 5 months ago
A Hierarchical Anonymous Communication Protocol for Sensor Networks
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
ICCSA
2005
Springer
15 years 5 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
IWINAC
2005
Springer
15 years 5 months ago
MEPIDS: Multi-Expression Programming for Intrusion Detection System
Abstract. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been ...
Crina Grosan, Ajith Abraham, Sang-Yong Han
OOPSLA
2005
Springer
15 years 5 months ago
Roles of variables in object-oriented programming
Roles can be assigned to occurrences of variables in programs according to a small number of stereotypical patterns of use. Studies on explicitly teaching roles to novices learnin...
Pauli Byckling, Petri Gerdt, Jorma Sajaniemi