Amanote Research

Amanote Research

    RegisterSign In

Optimal Scalable Security Architectures in the Presence of Colluding Mobile Traitors

doi 10.1109/etwcs.1999.897336
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
R. PoovendranJ.S. Baras
Publisher

IEEE


Related search

Behavior Forensics in Traitors Within Traitors for Scalable Multimedia

2006English

Requirements for Scalable Access Control and Security Management Architectures

2005English

Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services

Wireless Communications and Mobile Computing
Computer NetworksElectronic EngineeringInformation SystemsElectricalCommunications
2018English

Parallel Logic Programming Systems on Scalable Architectures

Journal of Parallel and Distributed Computing
Computer NetworksHardwareCommunicationsArchitectureTheoretical Computer ScienceArtificial IntelligenceSoftware
2000English

Security Architectures Using Formal Methods

IEEE Journal on Selected Areas in Communications
Computer NetworksElectronic EngineeringElectricalCommunications
1993English

Mobile Application (In)security

2015English

Colluding Through Suppliers

SSRN Electronic Journal
2012English

Mobile Ambients in Aspect-Oriented Software Architectures

English

Towards Scalable Optimal Traffic Control

2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy