Sciweavers

1757 search results - page 299 / 352
» Secure Content Validation
Sort
View
183
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
15 years 2 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
150
Voted
ASE
2005
145views more  ASE 2005»
15 years 2 months ago
Developing Ambient Intelligence Systems: A Solution based on Web Services
Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectiv...
Valérie Issarny, Daniele Sacchetti, Ferda T...
103
Voted
WICOMM
2008
108views more  WICOMM 2008»
15 years 2 months ago
The multimedia broadcast/multicast service
Abstract-- This article provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks. We first outline t...
George Xylomenos, Vasilis Vogkas, George Thanos
100
Voted
SAC
2008
ACM
15 years 2 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
TKDE
2008
154views more  TKDE 2008»
15 years 2 months ago
Watermarking Relational Databases Using Optimization-Based Techniques
Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In th...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor