Sciweavers

6137 search results - page 160 / 1228
» Securing Collaborative Applications
Sort
View
119
Voted
PIMRC
2010
IEEE
15 years 1 days ago
On the feasibility of receive collaboration in wireless sensor networks
In this paper, a new type of collaboration in wireless sensor networks (WSN) is suggested that exploits array processing algorithms for better reception of a signal. For receive co...
Behnam Banitalebi, S. Sigg, M. Beigl
DIAU
2000
Springer
15 years 6 months ago
Towards an Analysis of Onion Routing Security
This paper presents a security analysis of Onion Routing, an application independent infrastructure for tra c-analysis-resistant and anonymous Internet connections. It also includ...
Paul F. Syverson, Gene Tsudik, Michael G. Reed, Ca...
182
Voted
ICDE
2003
IEEE
101views Database» more  ICDE 2003»
16 years 3 months ago
The QUIQ Engine: A Hybrid IR DB System
For applications that involve rapidly changing textual data and also require traditional DBMS capabilities, current systems are unsatisfactory. In this paper, we describe a hybrid...
Navin Kabra, Raghu Ramakrishnan, Vuk Ercegovac
91
Voted
WIKIS
2009
ACM
15 years 8 months ago
Experience report - Wiki for law firms
This paper shows the experiences of a law firm with adopting Wiki Webs for knowledge management and collaboration over the last two years. Wikis created a business advantage for t...
Urs Egli, Peter Sommerlad
CCS
2003
ACM
15 years 7 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...