Sciweavers

1116 search results - page 26 / 224
» Secure Mediation: Requirements and Design
Sort
View
EVOTING
2004
91views Hardware» more  EVOTING 2004»
13 years 10 months ago
From Legal Principles to an Internet Voting System
: Past research on Internet voting has been concentrated on two aspects. First, there are investigations to find the appropriate balance between anonymity and authentication. Secon...
Melanie Volkamer, Dieter Hutter
INFOCOM
2010
IEEE
13 years 7 months ago
Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams
—Linear network coding is a promising technology that can maximize the throughput capacity of communication network. Despite this salient feature, there are still many challenges...
Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naiji...
GIS
2002
ACM
13 years 9 months ago
Design of field wrappers for mobile field data collection
In mobile field data collection, data gatherer requires to get geospatial information service to support in navigating to the right locations, describing context of observed objec...
Peisheng Zhao, Sarah Nusser, Leslie L. Miller
INFSOF
2007
83views more  INFSOF 2007»
13 years 9 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
MSWIM
2009
ACM
14 years 3 months ago
Designing an asynchronous group communication middleware for wireless users
We evaluate an asynchronous gossiping middleware for wireless users that propagates messages from any group member to all the other group members. This propagation can either be i...
Xuwen Yu, Surendar Chandra