Sciweavers

7992 search results - page 1398 / 1599
» Communication Abstractions for Distributed Systems
Sort
View
INFOCOM
2007
IEEE
15 years 11 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 8 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
ISN
1998
Springer
15 years 8 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
MOVEP
2000
136views Hardware» more  MOVEP 2000»
15 years 8 months ago
UPPAAL - Now, Next, and Future
Uppaal is a tool for modeling, simulation and verification of real-time systems, developed jointly by BRICS at Aalborg University and the Department of Computer Systems at Uppsala ...
Tobias Amnell, Gerd Behrmann, Johan Bengtsson, Ped...
USS
2004
15 years 6 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
« Prev « First page 1398 / 1599 Last » Next »