Sciweavers

1040 search results - page 99 / 208
» Privacy for Telecom Services
Sort
View
ACISP
2009
Springer
14 years 3 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu
IEEEARES
2008
IEEE
14 years 3 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
ESORICS
2008
Springer
13 years 11 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
14 years 3 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
WIRTSCHAFTSINFORMATI
2007
13 years 10 months ago
Perceived Usefulness of RFID-enabled Information Services - A Systematic Approach
Even though RFID technology is currently gaining importance mainly in logistics, usage areas, such as shopping or after-sales enhancements beyond the supply chain are envisioned. ...
Hanna Krasnova, Matthias Rothensee, Sarah Spiekerm...