Sciweavers

6844 search results - page 1205 / 1369
» Web Service Security
Sort
View
WIMOB
2008
IEEE
15 years 10 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
SECPERU
2006
IEEE
15 years 10 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
HIKM
2006
ACM
15 years 9 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...
SOUPS
2006
ACM
15 years 9 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
MSWIM
2005
ACM
15 years 9 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
« Prev « First page 1205 / 1369 Last » Next »