Sciweavers

2656 search results - page 27 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
JCIT
2008
100views more  JCIT 2008»
13 years 7 months ago
Basic Portal System with the Function of Communication Control for Each User
The Personal Portal is generally used as a communication mean and serves as an entrance to users where they can acquire interested information on the network. We have several prob...
Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi...
CCS
2004
ACM
14 years 1 months ago
Mitigating bandwidth-exhaustion attacks using congestion puzzles
d Abstract) XiaoFeng Wang∗ Michael K. Reiter† We present congestion puzzles (CP), a new countermeasure to bandwidth-exhaustion attacks. Like other defenses based on client puz...
XiaoFeng Wang, Michael K. Reiter
ICC
2009
IEEE
190views Communications» more  ICC 2009»
14 years 2 months ago
Protecting Location Privacy in Large-Scale Wireless Sensor Networks
—In a wireless sensor network, an adversary equipped monitoring antenna can easily overhear packets, which may facilitate identifying the directions of packet flows and trace to ...
Lei Kang
WECWIS
2008
IEEE
114views ECommerce» more  WECWIS 2008»
14 years 2 months ago
On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail
Electronic commerce has provided retailers with effective instruments to deploy one-to-one marketing over the internet. While the increasing use of sensors, RFID tags and other te...
Jens Strüker, Rafael Accorsi, Günter M&u...
SAINT
2008
IEEE
14 years 2 months ago
Managing Heterogeneous Data Flows in Wireless Sensor Networks Using a "Split Personality" Mote Platform
Remote sensing applications are increasingly making use of sensors that generate demanding data flows (e.g. digital imaging devices). This paper presents the
Danny Hughes, Mickaël Daudé, Geoff Cou...