Sciweavers

836 search results - page 65 / 168
» Privacy and Trust in Distributed Networks
Sort
View
ESORICS
2010
Springer
13 years 9 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
PERCOM
2005
ACM
14 years 8 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
CISIS
2009
IEEE
14 years 3 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
ESWS
2006
Springer
14 years 11 days ago
Semantic Web Policies - A Discussion of Requirements and Research Issues
Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the a...
Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, ...
CSE
2009
IEEE
14 years 3 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi