Sciweavers

1120 search results - page 203 / 224
» Securely sharing neuroimagery
Sort
View
WETICE
2007
IEEE
14 years 4 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
EPEW
2007
Springer
14 years 4 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
EUC
2007
Springer
14 years 4 months ago
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main ...
Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashra...
EUROSSC
2007
Springer
14 years 4 months ago
CenceMe - Injecting Sensing Presence into Social Networking Applications
Abstract. We present the design, prototype implementation, and evaluation of CenceMe, a personal sensing system that enables members of social networks to share their sensing prese...
Emiliano Miluzzo, Nicholas D. Lane, Shane B. Eisen...
GRID
2007
Springer
14 years 4 months ago
Dynamic, context-aware, least-privilege grid delegation
— Performing delegation in large scale, dynamic and distributed environments with large numbers of shared resources is more challenging than inside local administrative domains. ...
Mehran Ahsant, Jim Basney, S. Lennart Johnsson