Sciweavers

650 search results - page 122 / 130
» Privacy in Non-private Environments
Sort
View
WICON
2008
13 years 10 months ago
Lightweight management of scalable and personalised media in mobile IPTV networks
In the present paper a novel system for scalable and personalised media management and its architecture is presented. The proposed solution is based on the creation of a secure an...
Laura Arnaiz, Lara García, Federico Alvarez...
ISSA
2004
13 years 10 months ago
Intrinsic Legal Issues In It Security
E-commerce is a rapidly expanding sector all over the world. While this is apparently good news to the world's consumers and business companies, it is creating big challenges...
Respickius Casmir
CHI
2008
ACM
13 years 9 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
IJWIN
2006
119views more  IJWIN 2006»
13 years 8 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 8 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...