Sciweavers

6137 search results - page 160 / 1228
» Securing Collaborative Applications
Sort
View
PIMRC
2010
IEEE
13 years 8 months ago
On the feasibility of receive collaboration in wireless sensor networks
In this paper, a new type of collaboration in wireless sensor networks (WSN) is suggested that exploits array processing algorithms for better reception of a signal. For receive co...
Behnam Banitalebi, S. Sigg, M. Beigl
DIAU
2000
Springer
14 years 2 months ago
Towards an Analysis of Onion Routing Security
This paper presents a security analysis of Onion Routing, an application independent infrastructure for tra c-analysis-resistant and anonymous Internet connections. It also includ...
Paul F. Syverson, Gene Tsudik, Michael G. Reed, Ca...
ICDE
2003
IEEE
101views Database» more  ICDE 2003»
14 years 11 months ago
The QUIQ Engine: A Hybrid IR DB System
For applications that involve rapidly changing textual data and also require traditional DBMS capabilities, current systems are unsatisfactory. In this paper, we describe a hybrid...
Navin Kabra, Raghu Ramakrishnan, Vuk Ercegovac
WIKIS
2009
ACM
14 years 4 months ago
Experience report - Wiki for law firms
This paper shows the experiences of a law firm with adopting Wiki Webs for knowledge management and collaboration over the last two years. Wikis created a business advantage for t...
Urs Egli, Peter Sommerlad
CCS
2003
ACM
14 years 3 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...