Sciweavers

2429 search results - page 279 / 486
» Using Aspects to Design a Secure System
Sort
View
ISSADS
2005
Springer
15 years 8 months ago
Overview the Key Management in Ad Hoc Networks
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Gerardo del Valle, Roberto Gómez Cár...
CHI
2003
ACM
16 years 3 months ago
Co-experience: the social user experience
This paper presents a critical view of existing models of user experience. These models view experience as the subjective response in the individual's mind. While designers a...
Katja Battarbee
IAT
2008
IEEE
15 years 9 months ago
An Agent Modeling Language Implementing Protocols through Capabilities
In this paper we present how to use the Agent MOdeling LAnguage (AMOLA) to define agent interaction protocols and how to integrate these in an agent model. AMOLA provides the synt...
Nikolaos I. Spanoudakis, Pavlos Moraitis
ICTAI
2010
IEEE
15 years 1 months ago
Multicriteria Reasoning Considering Reliability or Availability
Abstract--Reliability and/or availability are increasingly important aspects in the design of systems, especially networks and service offerings. Optimization here is a multi-crite...
Tarik Hadzic, Helmut Simonis
CSREASAM
2006
15 years 4 months ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...