Sciweavers

123 search results - page 21 / 25
» Cocktail Party on the Mobile
Sort
View
SPW
2005
Springer
14 years 5 days ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund
CAISE
2003
Springer
13 years 12 months ago
Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications
Location tracking technologies are penetrating increasingly in industrial environments. Several challenges arise when people or mobile assets are tracked. Security is one of the ma...
Ana Isabel González-Tablas Ferreres, Benjam...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 8 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
WWW
2010
ACM
13 years 6 months ago
Web-based framework for spatiotemporal screen real estate management of interactive public displays
In this paper we present a web-based framework for spatiotemporal screen real estate management of interactive public displays. The framework facilitates dynamic partitioning of t...
Tomas Linden, Tommi Heikkinen, Timo Ojala, Hannu K...
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 6 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh