Sciweavers

650 search results - page 32 / 130
» Privacy in Non-private Environments
Sort
View
IDA
2011
Springer
13 years 4 months ago
PSO driven collaborative clustering: A clustering algorithm for ubiquitous environments
Abstract. The goal of this article is to introduce a collaborative clustering approach to the domain of ubiquitous knowledge discovery. This clustering approach is suitable in peer...
Benoît Depaire, Rafael Falcón, Koen V...
PDP
2008
IEEE
14 years 4 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
ICICS
1997
Springer
14 years 1 months ago
Secure document management and distribution in an open network environment
Abstract. This paper analyzes the problem of secure document management and distribution in an open network environment. Reader and author authentication, document integrity, origi...
Antonio Lioy, Fabio Maino, Marco Mezzalama
TRUSTBUS
2009
Springer
14 years 4 months ago
Advanced Features in Bayesian Reputation Systems
Abstract. Bayesian reputation systems are quite flexible and can relatively easily be adapted to different types of applications and environments. The purpose of this paper is to ...
Audun Jøsang, Walter Quattrociocchi
IEEEARES
2007
IEEE
14 years 4 months ago
Attacks are Protocols Too
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
Anders Moen Hagalisletto