Sciweavers

621 search results - page 49 / 125
» Security of Internet Location Management
Sort
View
DSN
2006
IEEE
15 years 10 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim
ICWE
2010
Springer
15 years 2 months ago
Designing Context-Aware Interactions for Task-Based Applications
Since contextual information has potential to improve task-based applications, we provide an approach for integrating contextual information in task-based applications by consideri...
Pablo Muñoz, Pau Giner, Miriam Gil
ICDCS
2006
IEEE
15 years 10 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
15 years 8 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
SWS
2004
ACM
15 years 9 months ago
Security in WebCom: addressing naming issues for a web services architecture
Supporting security in distributed systems is becoming more important with the ongoing work in grids, distributed middlewares and web services. Decentralised security architecture...
Thomas B. Quillinan, Simon N. Foley