Showing 1 - 7 of 7
Resource allocation decisions can be enhanced by performing risk assessment during the early development phase. In order to improve and maintain the security of the Information System (IS, hereafter), there is need to build risk analysis model that can dynamically analyze threat data collected...
Persistent link: https://www.econbiz.de/10012048074
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying...
Persistent link: https://www.econbiz.de/10012048265
Opportunistic networks are the special class of ad hoc networks where permanent link among the nodes are almost absent and communication occurs when an “opportunity” is found. The opportunistic networks have more diverse features than traditional ad hoc networks, like self-organized nature,...
Persistent link: https://www.econbiz.de/10012048770
Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. The basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or...
Persistent link: https://www.econbiz.de/10009483535
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication...
Persistent link: https://www.econbiz.de/10012045707
Persistent link: https://www.econbiz.de/10012666207
In der Arbeit soll die Wirtschaftlichkeit von Zertifizierungsstellen in Deutschland untersucht werden. Es erfolgt eine kurze Einführung in die technischen Grundlagen von Zertifizierungsstellen und Zertifikaten, die neben kryptographischen Verfahren der Verschlüsselung und Signatur die im...
Persistent link: https://www.econbiz.de/10008598621