Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 31 - 45 of 251.

Add to Quick Collection   All 251 Results

Sort:
 Add All Items to Quick Collection
Date: 2001
Language: eng
Resource Type: conference paper abstract
Identifier: http://hdl.handle.net/1959.14/1233337
Description: 1 page(s)
Date: 2003
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1231701
Description: 5 page(s)
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1248708
Description: RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Various solutions have been proposed but most of them have security and privacy vulnerabilities. In thi ... More
Reviewed: Reviewed
Date: 2016
Subject Keyword: Big Data Security | Security Attacks
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1145431
Description: In this paper we propose techniques for securing big data environments such as public cloud with tenants using their virtual machines for different services such as utility and healthcare. Our model m ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/284925
Description: Today mobile devices are increasingly being used to access data services in addition to the voice communications. However such devices have limited resources to enforce strong security measures and he ... More
Reviewed: Reviewed
Date: 2004
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1121766
Description: 11 page(s)
Date: 2011
Language: eng
Resource Type: conference paper abstract
Identifier: http://hdl.handle.net/1959.14/166426
Description: It is clear that the Internet is transforming the way we live and the recent decades have witnessed dramatic developments in information and communication technologies (ICT). Along with the phenomenal ... More
Date: 2010
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/156735
Description: 38 page(s)
Date: 2003
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1147805
Description: This paper describes a security architecture for mobile agent based systems. It defines the notion of a security-enhanced agent and outlines security management components in agent platform bases and ... More
Reviewed: Reviewed
Date: 2001
Language: eng
Resource Type: book
Identifier: http://hdl.handle.net/1959.14/1083966
Date: 2004
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/8414
Description: A mobile ad hoc network is a short-lived cooperative collection of mobile nodes that communicate with each other without the services of a fixed infrastructure. Each host acts as a specialised router ... More
Reviewed: Reviewed
Date: 2001
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/11286
Description: 6 page(s)
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1250731
Description: 3 page(s)
Date: 2013
Language: eng
Resource Type: book
Identifier: http://hdl.handle.net/1959.14/284800
Description: Machine generated contents note: Session I Invited Talk -- Planet Dynamic or: How I Learned to Stop Worrying and Love Reflection / Jan Vitek -- Session II Concurrency -- JATO: Native Code Atomicity fo ... More
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/192102
Description: Many wireless sensor networks (WSNs) consist of a large number of distributed sensor nodes that are batteries powered, vulnerable to tampering, and equipped with limited computational capabilities and ... More
Reviewed: Reviewed