Sciweavers

461 search results - page 51 / 93
» Protecting Transportation Infrastructure
Sort
View
CEAS
2008
Springer
13 years 12 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
ADC
2009
Springer
141views Database» more  ADC 2009»
14 years 4 months ago
Event-based Communication for Location-based Service Collaboration
Location-based context-aware services for mobile users need to collaborate in disparate networks. Services come and go as the user moves and no central repository is available. Th...
Annika Hinze, Yann Michel, Lisa Eschner
AXMEDIS
2006
IEEE
238views Multimedia» more  AXMEDIS 2006»
14 years 4 months ago
The Use of Incentive Mechanisms in Multi-Channel Mobile Music Distribution
The music industry is planning to perform a significant shift toward the digital world by partnering cellphone network operators to build a mobile music market. In this paper we ...
Marco Furini, Manuela Montangero
ESORICS
2005
Springer
14 years 3 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
GRID
2005
Springer
14 years 3 months ago
Web services and grid security vulnerabilities and threats analysis and model
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...