Sciweavers

15379 search results - page 358 / 3076
» Protecting users from
Sort
View
LOCWEB
2009
ACM
15 years 10 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
PERSUASIVE
2007
Springer
15 years 10 months ago
Can Brotherhood Be Sold Like Soap...Online? An Online Social Marketing and Advocacy Pilot Study Synopsis
: Having engaged one billion users by early 2006, the Internet is the world’s fastest-growing mass communications medium. As it permeates into countless lives across the planet, ...
Brian Cugelman, Mike Thelwall, Phil Dawes
CSFW
2000
IEEE
15 years 8 months ago
Reasoning about Secrecy for Active Networks
In this paper we develop a language of mobile agents called uPLAN for describing the capabilities of active (programmable) networks. We use a formal semantics for uPLAN to demonst...
Pankaj Kakkar, Carl A. Gunter, Martín Abadi
121
Voted
CSI
2008
113views more  CSI 2008»
15 years 4 months ago
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infra...
Klaus Plößl, Hannes Federrath
IEPOL
2006
60views more  IEPOL 2006»
15 years 3 months ago
A model of piracy
This paper develops a simple model of software piracy to analyze the short-run effects of piracy on software usage and the long-run effects on development incentives. We consider ...
Sang Hoo Bae, Jay Pil Choi