Sciweavers

631 search results - page 73 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
CCS
2007
ACM
15 years 7 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
EGC
2005
Springer
15 years 7 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...
VLDB
2008
ACM
141views Database» more  VLDB 2008»
16 years 1 months ago
Deploying and managing Web services: issues, solutions, and directions
Web services are expected to be the key technology in enabling the next installment of the Web in the form of the Service Web. In this paradigm shift, Web services would be treated...
Qi Yu, Xumin Liu, Athman Bouguettaya, Brahim Medja...
ICCAD
2006
IEEE
143views Hardware» more  ICCAD 2006»
15 years 10 months ago
Molecular organic electronic circuits
Electronic energy disorder associated within amorphous and polycrystaline molecular organic thin film structures strongly affects the macroscopic observable behavior of organic fi...
Vladimir Bulovi, Kevin Ryu, Charles Sodini, Ioanni...
104
Voted
CSFW
2005
IEEE
15 years 7 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers