Sciweavers

2601 search results - page 215 / 521
» Quantum Network Coding
Sort
View
124
Voted
CCS
2009
ACM
15 years 6 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
136
Voted
ICANN
2010
Springer
15 years 3 months ago
Unsupervised Learning of Relations
Learning processes allow the central nervous system to learn relationships between stimuli. Even stimuli from different modalities can easily be associated, and these associations ...
Matthew Cook, Florian Jug, Christoph Krautz, Angel...
125
Voted
LISA
2004
15 years 3 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...
ACSAC
1999
IEEE
15 years 6 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
EWSN
2010
Springer
15 years 11 months ago
Selective Reprogramming of Mobile Sensor Networks through Social Community Detection
Abstract. We target application domains where the behavior of animals or humans is monitored using wireless sensor network (WSN) devices. The code on these devices is updated frequ...
Bence Pásztor, Luca Mottola, Cecilia Mascol...