Sciweavers

6907 search results - page 258 / 1382
» Securing distributed adaptation
Sort
View
ATAL
2003
Springer
15 years 9 months ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
PPAM
2007
Springer
15 years 10 months ago
A Block-Based Parallel Adaptive Scheme for Solving the 4D Vlasov Equation
We present a parallel algorithm for solving the 4D Vlasov equation. Our algorithm is designed for distributed memory architectures. It uses an adaptive numerical method which reduc...
Olivier Hoenen, Eric Violard
IWCMC
2009
ACM
15 years 11 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth
SIGCOMM
2009
ACM
15 years 11 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
15 years 8 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto