Sciweavers

791 search results - page 134 / 159
» Users and Trust in Cyberspace
Sort
View
DBISP2P
2003
Springer
136views Database» more  DBISP2P 2003»
14 years 24 days ago
Building Content-Based Publish/Subscribe Systems with Distributed Hash Tables
Abstract. Building distributed content–based publish/subscribe systems has remained a challenge. Existing solutions typically use a relatively small set of trusted computers as b...
David K. Tam, Reza Azimi, Hans-Arno Jacobsen
NDSS
2002
IEEE
14 years 15 days ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
ICCCN
1998
IEEE
13 years 12 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer
WETICE
1998
IEEE
13 years 11 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
ESORICS
1994
Springer
13 years 11 months ago
The ESPRIT Project CAFE - High Security Digital Payment Systems
CAFE ("Conditional Access for Europe") is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for condit...
Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, ...