Sciweavers

947 search results - page 111 / 190
» Information Security in Mobile Databases
Sort
View
ACSAC
2002
IEEE
15 years 8 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
108
Voted
CORR
2007
Springer
138views Education» more  CORR 2007»
15 years 3 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
ECAI
2008
Springer
15 years 5 months ago
Learning to Select Object Recognition Methods for Autonomous Mobile Robots
Selecting which algorithms should be used by a mobile robot computer vision system is a decision that is usually made a priori by the system developer, based on past experience and...
Reinaldo A. C. Bianchi, Arnau Ramisa, Ramon L&oacu...
121
Voted
LOCA
2009
Springer
15 years 10 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
ICANN
2005
Springer
15 years 9 months ago
Fast Color-Based Object Recognition Independent of Position and Orientation
Small mobile robots typically have little on-board processing power for time-consuming vision algorithms. Here we show how they can quickly extract very dense yet highly useful inf...
Martijn van de Giessen, Jürgen Schmidhuber