Sciweavers

6137 search results - page 177 / 1228
» Securing Collaborative Applications
Sort
View
ESORICS
2010
Springer
13 years 11 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
CSSW
2007
13 years 11 months ago
Mapping Cognitive Models to Social Semantic Spaces - Collaborative Development of Project Ontologies
: In this paper, we present an approach that applies concepts from the areas of Social Software and Semantic Web to application development. We start
Thomas Riechert, Steffen Lohmann
HCI
2009
13 years 8 months ago
Mixing Content and Endless Collaboration - MashUps: Towards Future Personal Learning Environments
The recent movement by major Web services towards making many application programming interfaces (APIs) available for public use has led to the development of the new MashUp techno...
Andreas Auinger, Martin Ebner, Dietmar Nedbal, And...
DBSEC
2010
161views Database» more  DBSEC 2010»
13 years 11 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
ICOIN
2001
Springer
14 years 2 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae