Sciweavers

653 search results - page 85 / 131
» Security Architecture for Federated Cooperative Information ...
Sort
View
LOCA
2005
Springer
14 years 1 months ago
The xPOI Concept
Today, most mobile applications use geo-referenced points of interest (POIs) on location-based maps to call the user’s attention to interesting spots in the surroundings. The pre...
Jens Krösche, Susanne Boll
SBACPAD
2007
IEEE
143views Hardware» more  SBACPAD 2007»
14 years 2 months ago
A Code Compression Method to Cope with Security Hardware Overheads
Code Compression has been used to alleviate the memory requirements as well as to improve performance and/or minimize energy consumption. On the other hand, implementing security ...
Eduardo Wanderley Netto, Romain Vaslin, Guy Gognia...
SIGECOM
2005
ACM
113views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Dynamic and secure B2B e-contract update management
Business-to-business electronic contracts provide a specification of the agreed value exchange and guarantee legal protection to companies during electronic trading relations. Imp...
Samuil Angelov, Sven Till, Paul W. P. J. Grefen
DBSEC
2011
245views Database» more  DBSEC 2011»
12 years 11 months ago
Multilevel Secure Data Stream Processing
Abstract. With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed t...
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
IWCMC
2009
ACM
14 years 2 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth