Sciweavers

1801 search results - page 186 / 361
» Implementation-Oriented Secure Architectures
Sort
View
134
Voted
CCS
2007
ACM
15 years 9 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
113
Voted
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
15 years 9 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...
154
Voted
WETICE
2003
IEEE
15 years 9 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
165
Voted
CL
2002
Springer
15 years 3 months ago
Behavioural typing for safe ambients
We introduce a typed variant of Safe Ambients, named Secure Safe Ambients (SSA), whose type system allows behavioral invariants of ambients to be expressed and verified. The most ...
Michele Bugliesi, Giuseppe Castagna
119
Voted
CSCW
2002
ACM
15 years 3 months ago
Collaboration as an Activity Coordinating with Pseudo-Collective Objects
A coalition is a collaborative pattern in which people must work together to accomplish a task, but where organizational constraints stand in the way of their making use of the co...
David Zager