Sciweavers

4111 search results - page 108 / 823
» Security, Protocols, and Trust
Sort
View
63
Voted
AGENTS
2000
Springer
15 years 5 months ago
A Multi-agent system architecture for monitoring medical protocols
Teresa Alsinet, Ramón Béjar, C&egrav...
91
Voted
ACISP
1999
Springer
15 years 5 months ago
Accelerating Key Establishment Protocols for Mobile Communication
Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun...
85
Voted
CCS
2009
ACM
15 years 4 months ago
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering
Juan Caballero, Pongsin Poosankam, Christian Kreib...
81
Voted
CSFW
2004
IEEE
15 years 4 months ago
Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
CCGRID
2006
IEEE
15 years 6 months ago
gSET: Trust Management and Secure Accounting for Business in the Grid
We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust...
Thomas Weishäupl, Christoph Witzany, Erich Sc...