Sciweavers

6137 search results - page 177 / 1228
» Securing Collaborative Applications
Sort
View
114
Voted
ESORICS
2010
Springer
15 years 3 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
96
Voted
CSSW
2007
15 years 3 months ago
Mapping Cognitive Models to Social Semantic Spaces - Collaborative Development of Project Ontologies
: In this paper, we present an approach that applies concepts from the areas of Social Software and Semantic Web to application development. We start
Thomas Riechert, Steffen Lohmann
HCI
2009
14 years 12 months ago
Mixing Content and Endless Collaboration - MashUps: Towards Future Personal Learning Environments
The recent movement by major Web services towards making many application programming interfaces (APIs) available for public use has led to the development of the new MashUp techno...
Andreas Auinger, Martin Ebner, Dietmar Nedbal, And...
127
Voted
DBSEC
2010
161views Database» more  DBSEC 2010»
15 years 3 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
ICOIN
2001
Springer
15 years 6 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae