Sciweavers

731 search results - page 112 / 147
» Special Section on Information and Communication System Secu...
Sort
View
CSFW
2009
IEEE
14 years 3 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
CSCW
2004
ACM
14 years 2 months ago
Maintaining redundancy in the coordination of medical emergencies
This paper reports from a study of Norwegian medical emergency call (AMK) centres, in which advanced radio and telephone communication technologies are handled by a team of nurses...
Aksel Tjora
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
13 years 9 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
MSWIM
2006
ACM
14 years 2 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
CCS
2005
ACM
14 years 2 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...