Results 1 - 10
of
24
Delegation-based Authentication and Authorization for the IP-based Internet of Things
"... Abstract—IP technology for resource-constrained devices en-ables transparent end-to-end connections between a vast variety of devices and services in the Internet of Things (IoT). To protect these connections, several variants of traditional IP security protocols have recently been proposed for stan ..."
Abstract
- Add to MetaCart
for authentication, authorization, and secure data transmission in the IP-based IoT. The evaluation results show that compared to a public-key-based DTLS handshake our delegation architecture reduces the memory overhead by 64 %, computations by 97 %, network transmissions by 68 %. I.
Saskatoon By
"... In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree ..."
Abstract
- Add to MetaCart
In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree
Effective runtime monitoring of distributed
"... devices in the Internet of Things (IoT) and other data sources are increasingly bridging the gap between the physical and digital world by providing fine-grained data about real-world events. Enterprise software systems are adopting the paradigm of event-based systems (EBS) to enable them to react t ..."
Abstract
- Add to MetaCart
devices in the Internet of Things (IoT) and other data sources are increasingly bridging the gap between the physical and digital world by providing fine-grained data about real-world events. Enterprise software systems are adopting the paradigm of event-based systems (EBS) to enable them to react
unknown title
"... ABSTRACT: Cloud computing is an arising technology which provide various services through internet. User can remotelystored their data on the cloud. And enjoying on demand high quality cloud applications without the burden of local storage and maintenance. But the user do not fell protected because ..."
Abstract
- Add to MetaCart
. Yang, W. Lou, and Y.T. Hou explores the problem of secure and reliable cloud storage with efficiency consideration of both data repair and data retrieval and design a LT codes-based cloud storage service(LTCS)..By utilizing the fast BeliefPropagation decoding algorithm, LTCS provides efficient data
Guaranteeing Communication Quality in Real World WSN Deployments
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract
- Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
1 I-CASH: Intelligently Coupled Array of SSD and HDD
"... This paper presents a new disk I/O architecture composed of an array of a flash memory SSD (solid state disk) and a hard disk drive (HDD) that are intelligently coupled by a special algorithm. We call this architecture I-CASH: Intelligently Coupled Array of SSD and HDD. The SSD stores seldom-changed ..."
Abstract
- Add to MetaCart
This paper presents a new disk I/O architecture composed of an array of a flash memory SSD (solid state disk) and a hard disk drive (HDD) that are intelligently coupled by a special algorithm. We call this architecture I-CASH: Intelligently Coupled Array of SSD and HDD. The SSD stores seldom
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer
, 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract
- Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,
hardware and mobile web technology Master of Science Thesis in Programme Computer Systems and Networks
, 2013
"... Digitising statistics handling through ..."
4. TITLE AND SUBTITLE A Practical Theory of Micro-Solar Power Sensor Networks
, 2009
"... Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments ..."
Abstract
- Add to MetaCart
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
Acknowledgements
, 2006
"... First, I would like to thank to Dimka Karastoyanova and Mariano Cilia for all the fruitful discussions, their guidance and support through the course of this project. Thanks also to Prof. Alejandro Buchmann who sponsored my stay at Technische Universität Darmstadt during the spring of 2004. The spec ..."
Abstract
- Add to MetaCart
. The special thanks go to my advisor, Mariano Cilia, who has made all this possible. Finally, I’d like to thank to my family for all these years of support.
Results 1 - 10
of
24