Sciweavers

1116 search results - page 38 / 224
» Secure Mediation: Requirements and Design
Sort
View
CONEXT
2006
ACM
14 years 3 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
ECWEB
2003
Springer
93views ECommerce» more  ECWEB 2003»
14 years 2 months ago
A Secure Electronic Payment Scheme for Charity Donations
Although many charities have a web presence, almost all of them have been designed to accept credit cards as the only means for making donations. The anonymity requirements of many...
Mansour A. Al-Meaither, Chris J. Mitchell
EUC
2005
Springer
14 years 2 months ago
Ubiquitous Content Formulations for Real-Time Information Communications
Abstract. With rapid advancements in wireless devices, ubiquitous computing seems becoming a reality everyday. Active pervasive network infrastructure has been introduced to offer...
Ka Lun Eddie Law, Sunny So
CAISE
2009
Springer
14 years 3 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...
MM
2004
ACM
149views Multimedia» more  MM 2004»
14 years 2 months ago
Designing experiential environments for management of personal multimedia
With the increasing ubiquity of sensors and computational resources, it is becoming easier and increasingly common for people to electronically record, photographs, text, audio, a...
Rahul Singh, Rachel Knickmeyer, Punit Gupta, Rames...