Sciweavers

1116 search results - page 86 / 224
» Secure Mediation: Requirements and Design
Sort
View
JTAER
2008
100views more  JTAER 2008»
13 years 9 months ago
Securing Uniqueness of Rights e-Documents: A Deontic Process Perspective
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
Ronald M. Lee, Vu Nguyen, Anastasia Pagnoni
CCS
2004
ACM
14 years 2 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
JCDL
2005
ACM
156views Education» more  JCDL 2005»
14 years 2 months ago
A generic alerting service for digital libraries
Users of modern digital libraries (DLs) can keep themselves up-to-date by searching and browsing their favorite collections, or more conveniently by resorting to an alerting servi...
George Buchanan, Annika Hinze
TMC
2012
11 years 11 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
FC
2004
Springer
105views Cryptology» more  FC 2004»
14 years 2 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki