EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Networking and Communications"
Narrow search

Narrow search

Year of publication
Subject
All
Networking and Communications 7 Application Software Packages (excl. Computer Games) 3 Distributed Computing 2 Information and Computing Sciences 2 Communication Networks and Services not elsewhere classified 1 LAMED 1 MECHANICAL ENGINEERING 1 MIMOSA OSA-EAI 1 RFID 1 asset management 1 authentication 1 cloning 1 enterprise service bus 1 network security 1 patch strategy 1 privacy 1 rouge reader 1 service oriented architecture 1 system integration 1 untraceability 1 web services 1 worm propagation 1
more ... less ...
Online availability
All
Free 7
Type of publication
All
Article 7
Type of publication (narrower categories)
All
Congress Report 4
Language
All
English 4 Undetermined 3
Author
All
Xiang, Yang 3 Zhou, Wanlei 3 Barlow, Matthew 1 Bertoni, MD 1 Cesare, Silvio 1 Chowdhury, Morshed U. 1 Dukovska-Popovska, IK 1 Emmanouilidis, Christos 1 English, C 1 Harris, Frederick C. Jr. 1 Hu, Fei 1 Hvolby, HH 1 Kiritsis, Dimitris 1 Koronios, Andy 1 Lowe, H 1 Ma, Lin 1 Mathew, Avin D. 1 Mathew, Joseph 1 McGettrick, A 1 Nixon, Paddy 1 Purser, Michael 1 Ray, Biplob R. 1 Steger-Jensen, K 1 Terzis, S 1 Turner, P 1 Wagealla, W 1 Wang, Yini 1 Wen, Sheng 1
more ... less ...
Source
All
BASE 7
Showing 1 - 7 of 7
Cover Image
The microcosmic model of worm propagation
Wang, Yini; Wen, Sheng; Cesare, Silvio; Zhou, Wanlei; … - 2011
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help us to devise effective strategies against those worms' spreading. This paper...
Persistent link: https://www.econbiz.de/10009483723
Saved in:
Cover Image
Special section : trusted computing
Xiang, Yang; Zhou, Wanlei - 2011
Security and privacy have been the major concern when people build computer networks and systems. Any computer network or system must be trustworthy to avoid the risk of losing control and retain confidence that it will not fail [1] Jun Ho Huh, John Lyle, Cornelius Namiluko and Andrew Martin,...
Persistent link: https://www.econbiz.de/10009483724
Saved in:
Cover Image
Special section : trusted computing
Xiang, Yang; Zhou, Wanlei - 2011
Security and privacy have been the major concern when people build computer networks and systems. Any computer network or system must be trustworthy to avoid the risk of losing control and retain confidence that it will not fail [1] Jun Ho Huh, John Lyle, Cornelius Namiluko and Andrew Martin,...
Persistent link: https://www.econbiz.de/10009483795
Saved in:
Cover Image
Open standards-based system integration for asset management decision support
Mathew, Avin D.; Purser, Michael; Ma, Lin; Barlow, Matthew - 2010
Over the last decade, system integration has grown in popularity as it allows organisations to streamline business processes. Traditionally, system integration has been conducted through point-to-point solutions – as a new integration scenario requirement arises, a custom solution is built...
Persistent link: https://www.econbiz.de/10009437872
Saved in:
Cover Image
Enhanced RFID mutual authentication scheme based on shared secret information
Ray, Biplob R.; Chowdhury, Morshed U. - 2010
RFID is a revolutionary remote technology which has many useful implications. Large scale implementation of RFID is seeking 100% information privacy and untraceability, for users and organizations, which is suitable for low cost RFID tag (Class1). To protect users and organization we are...
Persistent link: https://www.econbiz.de/10009483920
Saved in:
Cover Image
Opportunities for RFID technology in green supply chains
Dukovska-Popovska, IK; Steger-Jensen, K; Hvolby, HH; … - 2009
Integrating environmental considerations into supply-chain management has become one of the major concerns to the industry and researchers. However, supply chains still have to deal with the challenges of effectiveness and cost efficiency. RFID is one of the contemporary technologies which have...
Persistent link: https://www.econbiz.de/10009484382
Saved in:
Cover Image
Trusting Collaboration in Global Computing Systems
English, C; Wagealla, W; Nixon, Paddy; Terzis, S; Lowe, H; … - 2003
A significant characteristic of global computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover, these decentralised systems are also characterised by partial views over the state of the global environment, implying that we...
Persistent link: https://www.econbiz.de/10009484367
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...