Sciweavers

160 search results - page 13 / 32
» Secure Information Flow in Mobile Bootstrapping Process
Sort
View
JUCS
2010
159views more  JUCS 2010»
14 years 6 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
89
Voted
CJ
2004
105views more  CJ 2004»
14 years 11 months ago
Generalized Template Splay: A Basic Theory and Calculus
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
George F. Georgakopoulos, David J. McClurkin
87
Voted
IFIP
2004
Springer
15 years 5 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
99
Voted
ICIP
2007
IEEE
16 years 1 months ago
Video Segmentation and Semantics Extraction from the Fusion of Motion and Color Information
In recent years, digital multimedia technologies have evolved significantly, and are finding numerous applications, over the internet, and even over mobile networks. Thus, the vid...
Alexia Briassouli, Vasileios Mezaris, Ioannis Komp...
ANTSW
2006
Springer
15 years 3 months ago
An Analysis of the Different Components of the AntHocNet Routing Algorithm
Abstract. Mobile ad hoc networks are a class of highly dynamic networks. In previous work, we developed a new routing algorithm, called AntHocNet, for these challenging network env...
Frederick Ducatelle, Gianni Di Caro, Luca Maria Ga...