Sciweavers

731 search results - page 29 / 147
» Special Section on Information and Communication System Secu...
Sort
View
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
14 years 2 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan
CHI
2005
ACM
13 years 10 months ago
Designs for home life
In this Special Interest Group (SIG) we intend to consider the increasingly popular area of interactive systems design for the home. Aiming to incorporate a wide range of perspect...
A. J. Bernheim Brush, Leysia Palen, Laurel Swan, A...
ISW
2010
Springer
13 years 6 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
ATAL
2003
Springer
14 years 2 months ago
A prototype multiAgent network security system
Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems...
Taraka Pedireddy, José M. Vidal
ADVIS
2004
Springer
14 years 2 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan