Sciweavers

5324 search results - page 891 / 1065
» Internet Security Protocols
Sort
View
IEEECIT
2006
IEEE
14 years 3 months ago
Multi-Agent based Data Integration in Real-world
This paper presents a Multi-Agent based Data Integration (MADI) framework for integrating distributed data source across Internet. This framework takes control on high-availabilit...
Yintang Dai, Shiyong Zhang
TRIDENTCOM
2006
IEEE
14 years 3 months ago
Barcelona's open access network testbed
Abstract— This paper describes the implementation and deployment of a novel architecture for a metropolitan open wireless access network, shared among different service providers...
Jaume Barceló, Carlos Macián, Jorge ...
WPES
2005
ACM
14 years 2 months ago
Determining user privacy preferences by asking the right questions: an automated approach
As the Internet becomes increasingly used for sensitive transactions, the need to protect user privacy becomes more and more important. One fundamental aspect of user privacy is t...
Keith Irwin, Ting Yu
ESWS
2005
Springer
14 years 2 months ago
Enabling Real World Semantic Web Applications Through a Coordination Middleware
In a real world scenario Semantic Web applications must be capable to cope with the large scale, distributed, heterogeneous, unreliable and insecure environment of the World Wide W...
Robert Tolksdorf, Lyndon J. B. Nixon, Elena Paslar...
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 2 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine