Sciweavers

14824 search results - page 2935 / 2965
» Security - Introduction
Sort
View
TWC
2008
154views more  TWC 2008»
14 years 10 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
CCR
2004
155views more  CCR 2004»
14 years 10 months ago
The dark side of the Web: an open proxy's view
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running services that interact with other resources on the Web. While such interaction c...
Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming ...
CN
2004
256views more  CN 2004»
14 years 10 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
CSSE
2004
IEEE
14 years 10 months ago
AdOrBAC: an administration model for Or-BAC
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects on objects are permitted or not, it is not convenie...
Frédéric Cuppens, Alexandre Mi&egrav...
CAD
2000
Springer
14 years 10 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat
« Prev « First page 2935 / 2965 Last » Next »