Sciweavers

576 search results - page 113 / 116
» Overview the Key Management in Ad Hoc Networks
Sort
View
INFORMS
1998
142views more  INFORMS 1998»
14 years 9 months ago
Distributed State Space Generation of Discrete-State Stochastic Models
High-level formalisms such as stochastic Petri nets can be used to model complex systems. Analysis of logical and numerical properties of these models often requires the generatio...
Gianfranco Ciardo, Joshua Gluckman, David M. Nicol
93
Voted
ESAS
2007
Springer
15 years 3 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
DRM
2004
Springer
15 years 2 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
78
Voted
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 3 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
100
Voted
ISPE
2003
14 years 11 months ago
Task-oriented engineering of coordinated software systems
ABSTRACT: In the context of Internet-based applications where heterogeneous, legacy entities should integrate and cooperate, the efficiency of the software production process is a ...
Enrico Denti, Andrea Omicini, Alessandro Ricci