Sciweavers

1779 search results - page 344 / 356
» Secure Communications in ATM Networks
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 1 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
HUC
2007
Springer
14 years 1 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
MIDDLEWARE
2007
Springer
14 years 1 months ago
Promoting levels of openness on component-based adaptable middleware
It is widely accepted that middleware is an important architectural element which facilitates the development of software systems. In this paper we propose a novel approach for de...
Tarcisio da Rocha, Anna-Brith Arntsen, Arne Ketil ...
POLICY
2007
Springer
14 years 1 months ago
A Socio-cognitive Approach to Modeling Policies in Open Environments
The richness of today’s electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current intera...
Tatyana Ryutov
GLOBECOM
2006
IEEE
14 years 1 months ago
RIM: Router Interface Marking for IP Traceback
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
Ruiliang Chen, Jung Min Park, Randolph Marchany