Sciweavers

836 search results - page 127 / 168
» Privacy and Trust in Distributed Networks
Sort
View
CHI
2002
ACM
14 years 9 months ago
The context fabric: an infrastructure for context-aware computing
Despite many sensor, hardware, networking, and software advances, it is still quite difficult to build effective and reliable context-aware applications. We propose to build a con...
Jason I. Hong
LISA
2007
13 years 11 months ago
OS Circular: Internet Client for Reference
OS Circular is a framework for Internet Disk Image Distribution of software for virtual machines, those which offer a ‘‘virtualized’’ common PC environment on any PC. OS i...
Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Anh-Q...
ICDCSW
2008
IEEE
14 years 3 months ago
Pairing Devices with Good Quality Output Interfaces
The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
Nitesh Saxena, Jonathan Voris
PODC
2011
ACM
12 years 11 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
CCS
2007
ACM
14 years 3 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...