Sciweavers

2927 search results - page 140 / 586
» Secure Distributed Human Computation
Sort
View
COLCOM
2007
IEEE
14 years 1 months ago
A structure preserving approach for securing XML documents
With the widespread adoption of XML as the message format to disseminate content over distributed systems including Web Services and Publish-Subscribe systems, different methods ha...
Mohamed Nabeel, Elisa Bertino
ICNP
2003
IEEE
14 years 2 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
CCS
2009
ACM
14 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
CHI
2011
ACM
13 years 1 months ago
Comparing activity theory with distributed cognition for video analysis: beyond "kicking the tires"
The field of HCI is growing, not only in the variety of application areas or the volume of research conducted, but also in the number of analytical approaches for use in the evalu...
Eric P. S. Baumer, Bill Tomlinson
ICDCS
2003
IEEE
14 years 2 months ago
Responsive Security for Stored Data
We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The...
Subramanian Lakshmanan, Mustaque Ahamad, H. Venkat...