Sciweavers

14824 search results - page 2556 / 2965
» Security - Introduction
Sort
View
IPCCC
2006
IEEE
15 years 10 months ago
A framework for distributed key management schemes in heterogeneous wireless sensor networks
— Key management is a major challenge in the design and deployment of secure wireless sensor networks. A common assumption in most distributed key management schemes is that all ...
Kejie Lu, Yi Qian, Jiankun Hu
IPPS
2006
IEEE
15 years 10 months ago
Parallel calculation of volcanoes for cryptographic uses
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Nevertheless, since not every elliptic curve is useful for cryptographic purposes, me...
Santi Martínez, R. Tomas, C. Roig, Magda Va...
IPPS
2006
IEEE
15 years 10 months ago
Web server protection by customized instruction set encoding
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Bernhard Fechner, Jörg Keller, Andreas Wohlfe...
IRI
2006
IEEE
15 years 10 months ago
Rapid systems of systems integration - combining an architecture-centric approach with enterprise service bus infrastructure
Rapid, yet methodical, systems of systems integration is in high demand. Application areas such as homeland security and disaster response add to the challenge because of a unique...
Ingolf Krüger, Michael Meisinger, Massimilian...
IRI
2006
IEEE
15 years 10 months ago
Toward component non-functional interoperability analysis: A UML-based and goal-oriented approach
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
« Prev « First page 2556 / 2965 Last » Next »