Sciweavers

72 search results - page 2 / 15
» Handling Identity in Peer-to-Peer Systems
Sort
View
FC
2008
Springer
102views Cryptology» more  FC 2008»
13 years 6 months ago
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal ...
André N. Klingsheim, Kjell Jørgen Ho...
FC
2009
Springer
121views Cryptology» more  FC 2009»
13 years 11 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
IAT
2006
IEEE
13 years 10 months ago
Dynamical Control in Large-Scale Material Handling Systems through Agent Technology
Delayed arrivals, missing tag codes, flight changes, break-downs, etc. are some of the factors, which make the environment of airport baggage handling systems (BHS) extremely dyn...
Kasper Hallenborg, Yves Demazeau
TPDS
2010
142views more  TPDS 2010»
13 years 3 months ago
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Abstract—Vehicular Ad Hoc Network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause d...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
SGAI
2007
Springer
13 years 11 months ago
Extending Jess to Handle Uncertainty
Computer scientists are often faced with the challenge of having to model the world and its associated uncertainties. One area in particular where modelling uncertainty is importa...
David Corsar, Derek H. Sleeman, Anne McKenzie