Sciweavers

1129 search results - page 174 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...
EUROSYS
2007
ACM
15 years 7 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
ISICT
2003
14 years 11 months ago
Topic maps for context management
Abstract. The advent of context-aware computing requires a new paradigm in information management. Context information in a computing environment will take the form of disparate an...
Ruaidhri Power
ISN
1999
Springer
139views Communications» more  ISN 1999»
15 years 2 months ago
Simplifying Real-Time Multimedia Application Development Using Session Descriptions
This paper presents a novel approach that simplifies real-time multimedia communication applications development and service provision. Such applications are no longer required to...
Sarom Ing, Steve Rudkin
CRITIS
2007
14 years 11 months ago
LoRDAS: A Low-Rate DoS Attack against Application Servers
In a communication network, there always exist some specific servers that should be considered a critical infrastructure to be protected, specially due to the nature of the servic...
Gabriel Maciá-Fernández, Jesú...