Sciweavers

1018 search results - page 103 / 204
» Remote User Authentication Using Public Information
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
SIGCOMM
2010
ACM
13 years 8 months ago
Privacy-preserving P2P data sharing with OneSwarm
Privacy--the protection of information from unauthorized disclosure--is increasingly scarce on the Internet, and yet increasingly important as every user becomes both a content co...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
ISSA
2008
13 years 9 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
SIGSOFT
2004
ACM
14 years 8 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
CORIA
2010
13 years 3 months ago
Spatio-Temporal Modeling for Knowledge Discovery in Satellite Image Databases
Knowledge discovery from satellite images in spatio-temporal context remains one of the major challenges in the remote sensing field. It is, always, difficult for a user to manuall...
Wadii Boulila, Imed Riadh Farah, Karim Saheb Ettab...