Sciweavers

555 search results - page 57 / 111
» Security Issues for Pervasive Personalized Communication Sys...
Sort
View
SACMAT
2004
ACM
14 years 1 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
MOBISYS
2008
ACM
14 years 7 months ago
Micro-Blog: sharing and querying content through mobile phones and social participation
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...
PEWASUN
2004
ACM
14 years 1 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ACSC
2007
IEEE
14 years 2 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
14 years 2 days ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam