Sciweavers

2517 search results - page 117 / 504
» Secure Deployment of Components
Sort
View
149
Voted
ICPPW
2009
IEEE
15 years 1 months ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
154
Voted
COMSUR
2011
213views Hardware» more  COMSUR 2011»
14 years 3 months ago
Securing BGP - A Literature Survey
Abstract—The Border Gateway Protocol (BGP) is the Internet’s inter-domain routing protocol. One of the major concerns related to BGP is its lack of effective security measures,...
Geoff Huston, Mattia Rossi, Grenville J. Armitage
118
Voted
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 9 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang
112
Voted
ICOIN
2007
Springer
15 years 9 months ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong
207
Voted
ECAGENTS
2001
Springer
150views ECommerce» more  ECAGENTS 2001»
15 years 8 months ago
Security Issues in M-Commerce: A Usage-Based Taxonomy
Abstract. M–commerce is a new area arising from the marriage of electronic commerce with emerging mobile and pervasive computing technology. The newness of this area—and the ra...
Suresh Chari, Parviz Kermani, Sean W. Smith, Leand...