Sciweavers

2927 search results - page 59 / 586
» Secure Distributed Human Computation
Sort
View
SKG
2006
IEEE
14 years 3 months ago
A New Method to Security Electronic Commerce Protocol
We use semi-regular entities to denote the entities different from penetrates that participate in the protocol on behalf of themselves such as customers in e-commerce.
Jie Yang, Hai-guang Mo, Yu-heng Long
AINA
2006
IEEE
14 years 3 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
MDM
2007
Springer
111views Communications» more  MDM 2007»
14 years 3 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich
CONCUR
2009
Springer
14 years 3 months ago
Flow Policy Awareness for Distributed Mobile Code
Several programming constructs have recently been proposed with the purpose of enabling the programmer to encode declassifying information flows within a program that complies wi...
Ana Almeida Matos
NSPW
2003
ACM
14 years 2 months ago
Towards a new paradigm for securing wireless sensor networks
K. Jones, Ashraf Wadaa, Stephan Olariu, Larry Wils...