Sciweavers

15379 search results - page 189 / 3076
» Protecting users from
Sort
View
149
Voted
CONEXT
2005
ACM
15 years 5 months ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati
109
Voted
HCI
2007
15 years 5 months ago
A Cross Culture Study on Phone Carrying and Physical Personalization
The mobile phone has become one of the essential objects that people carry when they leave home. By conducting a series of street interviews in 11 cities on 4 continents, we attemp...
Yanqing Cui, Jan Chipchase, Fumiko Ichikawa
101
Voted
SEC
2007
15 years 4 months ago
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsou...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
127
Voted
COMPSEC
2010
124views more  COMPSEC 2010»
15 years 3 months ago
Runtime monitoring for next generation Java ME platform
Many modern mobile devices, such as mobile phones or Personal Digital Assistants (PDAs), are able to run Java applications, such as games, Internet browsers, chat tools and so on....
Gabriele Costa, Fabio Martinelli, Paolo Mori, Chri...
CLEIEJ
1998
134views more  CLEIEJ 1998»
15 years 3 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You