Sciweavers

2358 search results - page 125 / 472
» A Secure Pervasive Environment
Sort
View
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 8 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...
OTM
2007
Springer
14 years 3 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 4 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
E4MAS
2005
Springer
14 years 2 months ago
A Survey of Environments and Mechanisms for Human-Human Stigmergy
Stigmergy (the coordination of agents through signs they make and sense in a shared environment) was originally articulated in the study of social insects. Its basic processes are ...
H. Van Dyke Parunak
AAAI
2007
13 years 11 months ago
Adaptive Localization in a Dynamic WiFi Environment through Multi-view Learning
Accurately locating users in a wireless environment is an important task for many pervasive computing and AI applications, such as activity recognition. In a WiFi environment, a m...
Sinno Jialin Pan, James T. Kwok, Qiang Yang, Jeffr...