Sciweavers

947 search results - page 89 / 190
» Information Security in Mobile Databases
Sort
View
131
Voted
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 10 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
ICEIS
2000
IEEE
15 years 8 months ago
University Information System Fully Based on WWW
This paper describes the development of Information System (IS) at Masaryk University in Brno. It supports full range of administrative and information functions in the study area,...
Jan Pazdziora, Michal Brandejs
168
Voted
ADHOCNOW
2007
Springer
15 years 10 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
119
Voted
DEXA
2003
Springer
115views Database» more  DEXA 2003»
15 years 9 months ago
On Mining Group Patterns of Mobile Users
In this paper, we present a group pattern mining approach to derive the grouping information of mobile device users based on the spatio-temporal distances among them. Group pattern...
Yida Wang, Ee-Peng Lim, San-Yih Hwang
158
Voted
OTM
2007
Springer
15 years 9 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros