Sciweavers

145 search results - page 18 / 29
» Privacy enhanced access control in pervasive computing envir...
Sort
View
PRESENCE
1998
98views more  PRESENCE 1998»
13 years 7 months ago
The Virtual Venue: User-Computer Interaction in Information-Rich Virtual Environments
We present a virtual environment application that allows users to access embedded information within an immersive virtual space. Due to the richness and complexity of this environ...
Doug A. Bowman, Larry F. Hodges, Jay David Bolter
CSFW
2011
IEEE
12 years 7 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
WOWMOM
2009
ACM
143views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Enhanced Ripple (E-Ripple) protocol for chain-based multihop wireless networks
It has been shown that IEEE 802.11 DCF medium access control (MAC) protocol may not be suitable for multihop wireless networks due to its relatively low throughput and severely un...
Quang Vu Nguyen, Ray-Guang Cheng
PDP
2008
IEEE
14 years 2 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi