Sciweavers

106 search results - page 10 / 22
» Service Substitution Revisited
Sort
View
SASN
2004
ACM
15 years 3 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
BPM
2009
Springer
113views Business» more  BPM 2009»
15 years 4 months ago
Set Algebra for Service Behavior: Applications and Constructions
Abstract. Compatibility of behavior, i.e. the correct ordering of messages, is one of the core aspects for the interaction between services as parts of an inter-organizational busi...
Kathrin Kaschner, Karsten Wolf
IJMMS
2008
73views more  IJMMS 2008»
14 years 9 months ago
Theorizing mobility in community networks
Community networks emerged in North America during the late 1970s and early 1980s. During the past three decades, paradigms for networked information, services, and collaboration ...
John M. Carroll, Mary Beth Rosson
ESAS
2004
Springer
15 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
15 years 2 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller