Sciweavers

75 search results - page 8 / 15
» A Comprehensive Secure VoIP Solution
Sort
View
ICC
2007
IEEE
14 years 2 months ago
Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
Joel O. Sandin, Bilal Khan
PPNA
2011
13 years 2 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 8 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
ESORICS
2009
Springer
14 years 2 months ago
Privacy in Georeferenced Context-Aware Services: A Survey
Location based services (LBS) are a specific instance of a broader class of Internet services that are predicted to become popular in a near future: context-aware services. The pr...
Daniele Riboni, Linda Pareschi, Claudio Bettini
CCS
2004
ACM
14 years 1 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner