Sciweavers

671 search results - page 132 / 135
» Trust evaluation in ad-hoc networks
Sort
View
ICIS
1997
13 years 11 months ago
Selling in the era of the "Net": integration of electronic commerce in small firms
This paper reports on a research study concerning the integration of electronic commerce (EC) into the pre-sales business processes of small firms. By means of a field survey, 17 ...
William J. Kettinger, Gary Hackbarth
DBISP2P
2003
Springer
136views Database» more  DBISP2P 2003»
14 years 3 months ago
Building Content-Based Publish/Subscribe Systems with Distributed Hash Tables
Abstract. Building distributed content–based publish/subscribe systems has remained a challenge. Existing solutions typically use a relatively small set of trusted computers as b...
David K. Tam, Reza Azimi, Hans-Arno Jacobsen
CCS
2003
ACM
14 years 3 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
MOBISYS
2008
ACM
14 years 9 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
ICETE
2004
253views Business» more  ICETE 2004»
13 years 11 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong