Sciweavers

194 search results - page 6 / 39
» A Protection Scheme for Collaborative Environments
Sort
View
CSIE
2009
IEEE
15 years 1 months ago
Accessing Password-Protected Resources without the Password
Sometimes it is desirable to access password-protected resources, but undesirable to disclose the password to the machine in use. In such situations, providing the password is a t...
Andreas Pashalidis
ICCS
2007
Springer
15 years 3 months ago
A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Yuanchu Hwang, Soe-Tsyr Yuan
INFOCOM
2005
IEEE
15 years 3 months ago
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
— When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the compromised nodes to inject false sensing reports or modi...
Wensheng Zhang, Guohong Cao
MTA
2006
218views more  MTA 2006»
14 years 9 months ago
Object-based MPEG-2 video indexing and retrieval in a collaborative environment
In this paper, an object-based video retrieval methodology for search in large, heterogeneous video collections is presented. The proposed approach employs a real-time, compressed-...
Vasileios Mezaris, Ioannis Kompatsiaris, Michael G...
OTM
2005
Springer
15 years 3 months ago
Registering a Business Collaboration Model in Multiple Business Environments
Today business registries are regarded as means of finding services offered by a business partner. However, business registries might also serve as means of seaching inter-organiza...
Birgit Hofreiter, Christian Huemer