Sciweavers

4264 search results - page 21 / 853
» Provenance-aware secure networks
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
14 years 4 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
58
Voted
SCN
2010
Springer
14 years 4 months ago
On predictive routing of security contexts in an all-IP network
Hahnsang Kim, Kang G. Shin
TELSYS
2010
104views more  TELSYS 2010»
14 years 4 months ago
The future of security in Wireless Multimedia Sensor Networks - A position paper
Manel Guerrero Zapata, Ruken Zilan, José M....
66
Voted
EJWCN
2011
122views more  EJWCN 2011»
14 years 1 months ago
Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks
Reza Azarderakhsh, Arash Reyhani-Masoleh