Sciweavers

372 search results - page 64 / 75
» p2p 2008
Sort
View
ANSS
2008
IEEE
14 years 1 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
SOSE
2008
IEEE
14 years 1 months ago
A Gateway Design for Message Passing on the SOA Healthcare Platform
Various security and privacy issues have emerged from the SOA healthcare platform. Large amounts of personal data are transmitted daily through the SOA healthcare platform. For se...
Chi-Lu Yang, Yeim-Kuan Chang, Chih-Ping Chu
ATAL
2008
Springer
13 years 9 months ago
Tags and image scoring for robust cooperation
Establishing and maintaining cooperation is an enduring problem in multi-agent systems and, although several solutions exist, the increased use of online trading systems, peerto-p...
Nathan Griffiths
CSREASAM
2008
13 years 9 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
IJIIDS
2008
100views more  IJIIDS 2008»
13 years 7 months ago
A novel vehicle communication paradigm based on Cellular Networks for improving the safety in roads
: Main aim of Intelligent Transport Systems (ITS) applied to roads is to increase their safety. To achieve this aim, many researchers are focused on developing robust and efficient...
José Santa, Rafael Toledo-Moreo, Antonio F....