Sciweavers

11594 search results - page 2123 / 2319
» Cooperation in Service Systems
Sort
View
CCS
2007
ACM
14 years 4 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...
DRM
2007
Springer
14 years 4 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
ECUMN
2007
Springer
14 years 4 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
ERCIMDL
2007
Springer
95views Education» more  ERCIMDL 2007»
14 years 4 months ago
A Study of Citations in Users' Online Personal Collections
Users’ personal citation collections reflect users’ interests and thus offer great potential for personalized digital services. We studied 18,120 citations in the personal co...
Nishikant Kapoor, John T. Butler, Sean M. McNee, G...
HPCC
2007
Springer
14 years 4 months ago
A Proactive Method for Content Distribution in a Data Indexed DHT Overlay
In a data-indexed DHT overlay network, published data annotations form distributed databases. Queries are distributed to these databases in a nonuniform way. Constructing content d...
Bassam A. Alqaralleh, Chen Wang, Bing Bing Zhou, A...
« Prev « First page 2123 / 2319 Last » Next »