Sciweavers

14824 search results - page 2751 / 2965
» Security - Introduction
Sort
View
114
Voted
SIGOPS
1998
123views more  SIGOPS 1998»
14 years 11 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
SIGKDD
2002
90views more  SIGKDD 2002»
14 years 11 months ago
Database Privacy
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Martin S. Olivier
TROB
2002
120views more  TROB 2002»
14 years 11 months ago
DPAC: an object-oriented distributed and parallel computing framework for manufacturing applications
Parallel and distributed computing infrastructure are increasingly being embraced in the context of manufacturing applications, including real-time scheduling. In this paper, we pr...
N. R. Srinivasa Raghavan, Tanmay Waghmare
CORR
2008
Springer
84views Education» more  CORR 2008»
14 years 11 months ago
Coupling Component Systems towards Systems of Systems
Systems of systems (SoS) are a hot topic in our "fully connected global world". Our aim is not to provide another definition of what SoS are, but rather to focus on the a...
Frédéric Autran, Jean-Philippe Auzel...
MAM
2007
143views more  MAM 2007»
14 years 11 months ago
A distributed admission control system for MANET environments supporting multipath routing protocols
Multipath routing protocols have proved to be able to enhance the performance of MANET in terms of reliability, load balancing, multimedia streaming, security, etc. However, deplo...
Carlos Miguel Tavares Calafate, José Oliver...
« Prev « First page 2751 / 2965 Last » Next »