Sciweavers

2001 search results - page 48 / 401
» A security architecture for data privacy and security
Sort
View
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
15 years 3 months ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa
WISTP
2010
Springer
15 years 6 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
JCM
2007
101views more  JCM 2007»
14 years 11 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
IEEEARES
2009
IEEE
15 years 6 months ago
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
—The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be...
Marcelo Masera, Igor Nai Fovino
ADHOC
2007
130views more  ADHOC 2007»
14 years 12 months ago
Implementation of security policy for clinical information systems over wireless sensor networks
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which c...
Jelena V. Misic, Vojislav B. Misic