Sciweavers

621 search results - page 3 / 125
» Security of Internet Location Management
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
ACSW
2003
13 years 8 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
ECSA
2008
Springer
13 years 9 months ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
INFOCOM
1999
IEEE
13 years 11 months ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...