Sciweavers

6861 search results - page 1272 / 1373
» Security for Ubiquitous Computing
Sort
View
SIGCOMM
2005
ACM
14 years 2 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
WPES
2005
ACM
14 years 2 months ago
Information revelation and privacy in online social networks
Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create on...
Ralph Gross, Alessandro Acquisti, H. John Heinz II...
ATAL
2005
Springer
14 years 2 months ago
Fuzzy number approach to trust in coalition environment
General trust management model that we present is adapted for ad-hoc coalition environment, rather than for classic client-supplier relationship. The trust representation used in ...
Martin Rehák, Michal Pechoucek, Petr Benda
CIS
2005
Springer
14 years 2 months ago
ID-Based Restrictive Partially Blind Signatures
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
EUC
2005
Springer
14 years 2 months ago
Human Position/Height Detection Using Analog Type Pyroelectric Sensors
Abstract. Pyroelectric sensors can detect changes of infrared rays. Usually, typical pyroelectric sensors are the digital output type, used for lighting switches and security syste...
Shinya Okuda, Shigeo Kaneda, Hirohide Haga
« Prev « First page 1272 / 1373 Last » Next »