Sciweavers

589 search results - page 78 / 118
» Evaluating mobile phones as risk information providers
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
PVLDB
2010
143views more  PVLDB 2010»
13 years 7 months ago
Embellishing Text Search Queries To Protect User Privacy
Users of text search engines are increasingly wary that their activities may disclose confidential information about their business or personal profiles. It would be desirable f...
HweeHwa Pang, Xuhua Ding, Xiaokui Xiao
INFOCOM
2012
IEEE
11 years 11 months ago
RISA: Distributed Road Information Sharing Architecture
—With the advent of the new IEEE 802.11p DSRC/WAVE radios, Vehicle-to-Vehicle (V2V) communications is poised for a dramatic leap. A canonical application for these future vehicul...
Joon Ahn, Yi Wang, Bo Yu, Fan Bai, Bhaskar Krishna...
AROBOTS
2007
119views more  AROBOTS 2007»
13 years 9 months ago
Development environments for autonomous mobile robots: A survey
Robotic Development Environments (RDEs) have come to play an increasingly important role in robotics research in general, and for the development of architectures for mobile robot...
James F. Kramer, Matthias Scheutz
ECIS
2001
13 years 10 months ago
Evaluating WAP News Sites: The Webqual/m Approach
This paper reports on the evaluation of wireless Internet news sites using the WebQual/m instrument. From initial application in the domain of traditional Internet Web sites, the ...
Stuart J. Barnes, Kenny Liu, Richard T. Vidgen