Sciweavers

731 search results - page 118 / 147
» Special Section on Information and Communication System Secu...
Sort
View
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
14 years 3 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
SEC
2003
13 years 10 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
WWW
2003
ACM
14 years 9 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
SIGCSE
2009
ACM
161views Education» more  SIGCSE 2009»
14 years 1 months ago
An activity-based sensor networks course for undergraduates with sun spot devices
Wireless sensor networks are revolutionizing the instrumentation of the physical world, across scientific, industrial and military applications. In this paper, we describe our eff...
Damon Tyman, Nirupama Bulusu, Jens Mache
JSW
2007
90views more  JSW 2007»
13 years 8 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan