Sciweavers

30 search results - page 3 / 6
» The Structure of Authority: Why Security Is Not a Separable ...
Sort
View
IEEEIAS
2008
IEEE
13 years 11 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
PET
2007
Springer
13 years 11 months ago
Louis, Lester and Pierre: Three Protocols for Location Privacy
Abstract. Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider...
Ge Zhong, Ian Goldberg, Urs Hengartner
WS
2005
ACM
13 years 11 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble
TES
2005
Springer
13 years 10 months ago
Systematic Design of Web Service Transactions
The development of composite Web services is still not as simple as the original vision indicated. Currently, the designer of a composite service needs to consider many different ...
Benjamin A. Schmit, Schahram Dustdar
IACR
2011
101views more  IACR 2011»
12 years 5 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song