Sciweavers

6696 search results - page 129 / 1340
» Securing social networks
Sort
View
MOBIHOC
2001
ACM
14 years 10 months ago
Secure pebblenets
Stefano Basagni, Kris Herrin, Danilo Bruschi, Emil...
EWSN
2007
Springer
14 years 10 months ago
Secure Data Aggregation with Multiple Encryption
Melek Önen, Refik Molva
APNOMS
2007
Springer
14 years 4 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
CHI
2009
ACM
14 years 11 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
AAAIDEA
2005
IEEE
14 years 4 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings