Sciweavers

14824 search results - page 2726 / 2965
» Security - Introduction
Sort
View
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 2 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
IJISEC
2006
106views more  IJISEC 2006»
15 years 2 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
123
Voted
CONCURRENCY
2007
83views more  CONCURRENCY 2007»
15 years 2 months ago
Enabling community access to TeraGrid visualization resources
Visualization is an important part of the data analysis process. Many researchers, however, do not have access to the resources required to do visualization effectively for large ...
Justin Binns, Jonathan DiCarlo, Joseph A. Insley, ...
143
Voted
IJNSEC
2006
205views more  IJNSEC 2006»
15 years 2 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
IJNSEC
2006
82views more  IJNSEC 2006»
15 years 2 months ago
A Study of Micro-payment Based on One-way Hash Chain
Electronic payment systems have gradually become an important issue nowadays because of the popularity and importance of electronic commerce on the Internet. Security and convenie...
Min-Shiang Hwang, Pei-Chen Sung
« Prev « First page 2726 / 2965 Last » Next »