The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...