Sciweavers

257 search results - page 14 / 52
» Delegating network security with more information
Sort
View
IPCCC
2006
IEEE
14 years 2 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
WPES
2005
ACM
14 years 2 months ago
Information revelation and privacy in online social networks
Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create on...
Ralph Gross, Alessandro Acquisti, H. John Heinz II...
ISSA
2008
13 years 10 months ago
Towards a Framework for a Network Warfare Capability
Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of v...
Namosha Veerasamy, Jan H. P. Eloff
ICICS
2010
Springer
13 years 6 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
EDBT
2008
ACM
194views Database» more  EDBT 2008»
14 years 8 months ago
XCraft: boosting the performance of active XML materialization
An active XML (AXML) document contains tags representing calls to Web services. Therefore, retrieving its contents consists in materializing its data elements by invoking the embe...
Gabriela Ruberg, Marta Mattoso