Sciweavers

637 search results - page 75 / 128
» A Privacy Enhanced Service Architecture for Mobile Users
Sort
View
SAC
2003
ACM
14 years 2 months ago
Systems Architecture for Pervasive Retail
Recent developments in mobile technologies and associated economies of scale via mature manufacturing processes have made possible the construction of pervasive systems in specifi...
George Roussos, Panos Kourouthanasis, Eugene A. Gr...
COMCOM
2010
133views more  COMCOM 2010»
13 years 9 months ago
Supporting mobility in an IMS-based P2P IPTV service: A proactive context transfer mechanism
In recent years, IPTV has received an increasing amount of interest from the industry, commercial providers and the research community, alike. In this context, standardization bod...
Iván Vidal, Jaime García-Reinoso, An...
ACSAC
2005
IEEE
14 years 2 months ago
Improved Port Knocking with Strong Authentication
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an au...
Rennie deGraaf, John Aycock, Michael J. Jacobson J...
ACSAC
2000
IEEE
14 years 1 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
MOBILITY
2009
ACM
14 years 3 months ago
Mobile visual access to legacy voice-based applications
Vocal systems are a well-established reality. Examples of popular voice-based applications include helpdesk services, reservation systems, and vocal mailboxes. These services, tha...
Marco Avvenuti, Alessio Vecchio