Sciweavers

947 search results - page 74 / 190
» Information Security in Mobile Databases
Sort
View
236
Voted
ITCC
2005
IEEE
15 years 9 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
147
Voted
RTSS
2002
IEEE
15 years 8 months ago
STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees
Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data it...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
135
Voted
AGENTLINK
2003
Springer
283views ECommerce» more  AGENTLINK 2003»
15 years 9 months ago
MIKS : An Agent Framework Supporting Information Access and Integration
Providing an integrated access to multiple heterogeneous sources is a challenging issue in global information systems for cooperation and interoperability. In the past, companies h...
Domenico Beneventano, Sonia Bergamaschi, Gionata G...
137
Voted
SSD
2009
Springer
141views Database» more  SSD 2009»
15 years 10 months ago
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
Abstract. Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, howev...
Kar Way Tan, Yimin Lin, Kyriakos Mouratidis
168
Voted
ADBIS
2008
Springer
219views Database» more  ADBIS 2008»
15 years 10 months ago
Data Stream Analysis for Location-Aware Collaborative Information Retrieval
Abstract. We propose a new approach for enhancing collaborative information retrieval by means of incorporating positional data for a location-aware personalized retrieval process....
Andreas Behrend, Frank Reichartz, Christian Dorau,...