Sciweavers

726 search results - page 12 / 146
» Securing XML data in third-party distribution systems
Sort
View
SECURWARE
2008
IEEE
14 years 2 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
CCS
2007
ACM
14 years 1 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
IEE
2011
13 years 2 months ago
Using autonomous components to improve runtime qualities of software
: In the development of software systems, quality properties should be considered along with the development process so that the qualities of software systems can be inferred and p...
Wenpin Jiao
ICC
2009
IEEE
130views Communications» more  ICC 2009»
13 years 5 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...
WETICE
2003
IEEE
14 years 28 days ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock