Sciweavers

2454 search results - page 217 / 491
» Privacy in the Information and Communications Technologies
Sort
View
INFOCOM
2008
IEEE
15 years 8 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
ICEIS
1999
IEEE
15 years 6 months ago
Holonic Dynamic Scheduling Architecture and Services
: Manufacturing systems are changing its structure and organisation. Supply chain are evolving to more coupled organisations, like virtual enterprises, though maintaining the singl...
Nuno Silva, Carlos Ramos
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 7 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
133
Voted
CORR
2008
Springer
187views Education» more  CORR 2008»
15 years 1 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
129
Voted
ESWS
2009
Springer
15 years 8 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller