Sciweavers

510 search results - page 75 / 102
» Security issues in control, management and routing protocols
Sort
View
SDMW
2005
Springer
14 years 1 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
JUCS
2007
93views more  JUCS 2007»
13 years 7 months ago
Quality of Service Routing in a MANET with OLSR
: Ad hoc wireless networks have enormous commercial and military potential because of their self-organizing capacity and mobility support. However, some specificities of these net...
Dang-Quan Nguyen, Pascale Minet
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 2 months ago
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Evangelos Papapetrou, Efthymia Rova, Apostolos Zar...
WOWMOM
1999
ACM
153views Multimedia» more  WOWMOM 1999»
14 years 1 days ago
Mobility Support Using SIP
Enabling mobility in IP networks is an important issue for making use of the many light-weight devices appearing at the market. The IP mobility support being standardized in the I...
Elin Wedlund, Henning Schulzrinne
IEEEARES
2007
IEEE
14 years 2 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer