Sciweavers

2217 search results - page 424 / 444
» A Data Privacy Taxonomy
Sort
View
133
Voted
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 3 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
123
Voted
IJMMS
2008
68views more  IJMMS 2008»
15 years 3 months ago
Mobile technologies in mobile spaces: Findings from the context of train travel
Whilst mobile work is increasingly prevalent, there is little detailed study of this phenomenon in the specific context of a train. Thus, the current study focuses on how mobile w...
Carolyn M. Axtell, Donald Hislop, Steve Whittaker
146
Voted
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 3 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
138
Voted
IJSNET
2006
106views more  IJSNET 2006»
15 years 3 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
127
Voted
PR
2008
137views more  PR 2008»
15 years 3 months ago
Cancellable biometrics and annotations on BioHash
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges ...
Andrew Beng Jin Teoh, Yip Wai Kuan, Sangyoun Lee