Sciweavers

3116 search results - page 531 / 624
» Design and implementation of network puzzles
Sort
View
MOBISYS
2008
ACM
16 years 4 months ago
SeeMon: scalable and energy-efficient context monitoring framework for sensor-rich mobile environments
Proactively providing services to mobile individuals is essential for emerging ubiquitous applications. The major challenge in providing users with proactive services lies in cont...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Hyonik Le...
MOBISYS
2007
ACM
16 years 4 months ago
SmartSiren: virus detection and alert for smartphones
Smartphones have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devi...
Jerry Cheng, Starsky H. Y. Wong, Hao Yang, Songwu ...
CCS
2009
ACM
15 years 11 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
TRUST
2009
Springer
15 years 11 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
HIKM
2006
ACM
15 years 10 months ago
Epoch: an ontological framework to support clinical trials management
The increasing complexity of clinical trials has generated an enormous requirement for knowledge and information specification at all stages of the trials, including planning, doc...
Ravi D. Shankar, Susana B. Martins, Martin J. O'Co...