Sciweavers

391 search results - page 43 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
LOCA
2005
Springer
14 years 2 months ago
Context Obfuscation for Privacy via Ontological Descriptions
Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is poten...
Ryan Wishart, Karen Henricksen, Jadwiga Indulska
PERCOM
2005
ACM
14 years 8 months ago
Securing Wireless Networks in a University Environment
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communicat...
Jochen Eisinger, Peter Winterer, Bernd Becker
APNOMS
2007
Springer
14 years 2 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
ISPA
2004
Springer
14 years 2 months ago
Building Infrastructure Support for Ubiquitous Context-Aware Systems
Abstract. Many context-aware systems have been demonstrated in lab environments; however, due to some difficulties such as the scalability and privacy issues, they are not yet prac...
Wei Li, Martin Jonsson, Fredrik Kilander, Carl Gus...
CCS
2010
ACM
13 years 8 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...