Sciweavers

6122 search results - page 1118 / 1225
» Securing network access in wireless sensor networks
Sort
View
MOBICOM
2004
ACM
15 years 3 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
MMMACNS
2001
Springer
15 years 2 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
SIGUCCS
2000
ACM
15 years 1 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman
PAMI
2010
168views more  PAMI 2010»
14 years 8 months ago
The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)
—A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 ind...
Javier Ortega-Garcia, Julian Fiérrez, Ferna...
IEEESCC
2007
IEEE
15 years 4 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
« Prev « First page 1118 / 1225 Last » Next »