Sciweavers

2691 search results - page 398 / 539
» Security in Ad Hoc Networks
Sort
View
SISW
2005
IEEE
14 years 3 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
STORAGESS
2005
ACM
14 years 3 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
PST
2008
13 years 11 months ago
Unlinkable Communication
In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols e...
Volker Fusenig, Eugen Staab, Uli Sorger, Thomas En...
CGA
2008
13 years 10 months ago
Mobile Phone-Enabled Museum Guidance with Adaptive Classification
We present an adaptive museum guidance system called PhoneGuide. It uses camera-equipped mobile phones for on-device object recognition in ad-hoc sensor networks and provides locat...
Erich Bruns, Benjamin Brombach, Oliver Bimber
SIGCSE
2005
ACM
110views Education» more  SIGCSE 2005»
14 years 3 months ago
Towards concrete concurrency: occam-pi on the LEGO mindstorms
In a world of ad-hoc networks, highly interconnected mobile devices and increasingly large supercomputer clusters, students need models of computation that help them think about d...
Christian L. Jacobsen, Matthew C. Jadud