Sciweavers

287 search results - page 23 / 58
» An Information Security Strategy for Networkable Devices
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
OTM
2005
Springer
14 years 1 months ago
Location-Based Mobile Querying in Peer-to-Peer Networks
Peer-to-peer (P2P) networks are receiving increasing attention in a variety of current applications. In this paper, we concentrate on applications where a mobile user queries peers...
Michel Scholl, Marie Thilliez, Agnès Voisar...
TIM
2010
144views Education» more  TIM 2010»
13 years 2 months ago
A Decentralized Observer for Ship Power System Applications: Implementation and Experimental Validation
In the last few years, the growing complexity of the electrical power networks, mainly due to the increased use of electronic converters together with the requirements of a higher ...
Andrea Benigni, Gabriele D'Antona, U. Ghisla, Anto...
IJWIS
2007
153views more  IJWIS 2007»
13 years 8 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
WISTP
2010
Springer
14 years 3 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...