Sciweavers

555 search results - page 14 / 111
» Security Issues for Pervasive Personalized Communication Sys...
Sort
View
OTM
2007
Springer
14 years 1 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
CCS
2010
ACM
13 years 8 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
CSREAPSC
2006
13 years 9 months ago
Design and Implementation of SONICA (Service Oriented Network Interoperability for Component Adaptation) for Multimedia Pervasiv
Abstract - Recent advances in multimedia network systems have led to the development of a new generation of applications that associate the use of various multimedia objects. The c...
Hiroshi Hayakawa, Takahiro Koita, Kenya Sato
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 1 months ago
The Impacts of Delphi Communication Structure on Small and Medium Sized Asynchronous Groups: Preliminary Results
Communication structure is a way of improving the effectiveness of group communications by coordinating group members’ individual efforts. This study investigates the use of Del...
Hee-Kyung Cho, Murray Turoff, Starr Roxanne Hiltz
SP
1989
IEEE
13 years 11 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik