Sciweavers

34 search results - page 5 / 7
» Reasoning about Security in Mobile Ambients
Sort
View
CSFW
2010
IEEE
13 years 10 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
IJMSO
2007
201views more  IJMSO 2007»
13 years 6 months ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
VOTEID
2007
Springer
14 years 11 days ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
ENTCS
2007
79views more  ENTCS 2007»
13 years 6 months ago
Towards Trustworthy Spatial Messaging
Spatial messaging is a term that defines the virtual publication of data in physical places. Generally, anyone in the neighborhood of such a publication point gets the message. F...
Michel Deriaz, Jean-Marc Seigneur
PEWASUN
2004
ACM
13 years 11 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...