Sciweavers

224 search results - page 34 / 45
» pervasive 2006
Sort
View
JCM
2006
112views more  JCM 2006»
14 years 10 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
JNW
2006
94views more  JNW 2006»
14 years 10 months ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang
JUCS
2006
86views more  JUCS 2006»
14 years 10 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
JSS
2000
97views more  JSS 2000»
14 years 9 months ago
Exploring the relationships between design measures and software quality in object-oriented systems
The first goal of this paper is to empirically explore the relationships between existing object-oriented coupling, cohesion, and inheritance measures and the probability of fault...
Lionel C. Briand, Jürgen Wüst, John W. D...
MONET
2007
111views more  MONET 2007»
14 years 9 months ago
Resource Discovery in Activity-Based Sensor Networks
— This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level conc...
Doina Bucur, Jakob E. Bardram