Sciweavers

791 search results - page 122 / 159
» Users and Trust in Cyberspace
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 7 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
JMM
2007
107views more  JMM 2007»
13 years 7 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
IAJIT
2010
133views more  IAJIT 2010»
13 years 6 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
ECWEB
2010
Springer
162views ECommerce» more  ECWEB 2010»
13 years 5 months ago
The Open Metaverse Currency (OMC) - A Micropayment Framework for Open 3D Virtual Worlds
: Virtual worlds have become very popular recently, in particular 3D virtual worlds with a built-in virtual currency that enables providers and users to monetize their creations. V...
Frank Kappe, Michael Steurer
IPAW
2010
13 years 5 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau