Sciweavers

1583 search results - page 86 / 317
» The Quorum Deployment Problem
Sort
View
NSPW
2006
ACM
15 years 9 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann
ICDCS
2005
IEEE
15 years 9 months ago
Location Estimation in Ad Hoc Networks with Directional Antennas
With the development of location aware sensor applications, location determination has become an increasingly important middleware technology. Numerous current technologies for lo...
Nipoon Malhotra, Mark D. Krasniewski, Chin-Lung Ya...
128
Voted
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
15 years 9 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
125
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
FIT: fast Internet traceback
— Traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks, as well as being of forensic value to law enforcement. Currently proposed IP trace...
Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
120
Voted
ICCNMC
2005
Springer
15 years 9 months ago
Semantic Sensor Net: An Extensible Framework
Existing approaches for sensor networks suffer from a number of critical drawbacks. First, homogeneous deployments have been commonly assumed, but in practice multiple deployments ...
Lionel M. Ni, Yanmin Zhu, Jian Ma, Minglu Li, Qion...