Sciweavers

1663 search results - page 131 / 333
» Privacy and Identity Management
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 11 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
WISA
2009
Springer
15 years 11 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
128
Voted
ACSAC
2007
IEEE
15 years 11 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...
ACSAC
2001
IEEE
15 years 8 months ago
Secure Anonymous Group Infrastructure for Common and Future Internet Applications
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
Nathalie Weiler
165
Voted
ESWS
2008
Springer
15 years 6 months ago
Managing URI Synonymity to Enable Consistent Reference on the Semantic Web
The Web of Data is growing at an ever increasing rate, with RDF datasets being produced in the order of billions of triples. The effect of this increase has meant that many entitie...
Afraz Jaffri, Hugh Glaser, Ian Millard