Sciweavers

14824 search results - page 2520 / 2965
» Security - Introduction
Sort
View
AINA
2007
IEEE
15 years 10 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
AINA
2007
IEEE
15 years 10 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
AVSS
2007
IEEE
15 years 10 months ago
Detection of abandoned objects in crowded environments
With concerns about terrorism and global security on the rise, it has become vital to have in place efficient threat detection systems that can detect and recognize potentially da...
Medha Bhargava, Chia-Chih Chen, Michael S. Ryoo, J...
CGO
2007
IEEE
15 years 10 months ago
Evaluating Indirect Branch Handling Mechanisms in Software Dynamic Translation Systems
Software Dynamic Translation (SDT) systems are used for program instrumentation, dynamic optimization, security, intrusion detection, and many other uses. As noted by many researc...
Jason Hiser, Daniel Williams, Wei Hu, Jack W. Davi...
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
15 years 10 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
« Prev « First page 2520 / 2965 Last » Next »