Sciweavers

6137 search results - page 176 / 1228
» Securing Collaborative Applications
Sort
View
CN
1999
88views more  CN 1999»
13 years 10 months ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart
MHCI
2004
Springer
14 years 3 months ago
Supporting Museum Co-visits Using Mobile Devices
Abstract. The goal of this work is to provide tools that promote social interactions between visitors through cooperative and educational games. In this paper, we describe how to s...
Yann Laurillau, Fabio Paternò
WWIC
2004
Springer
197views Communications» more  WWIC 2004»
14 years 3 months ago
Context-Aware Group Communication in Mobile Ad-Hoc Networks
Abstract. The widespread availability of both fixed and wireless network connectivity and the growing market of portable devices are enabling anytime and anywhere impromptu collabo...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari
WISEC
2010
ACM
14 years 3 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
FC
2005
Springer
157views Cryptology» more  FC 2005»
14 years 3 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman