Sciweavers

2340 search results - page 80 / 468
» Data abstraction and information hiding
Sort
View
INFOCOM
2007
IEEE
15 years 4 months ago
Scalable Secure Bidirectional Group Communication
— Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives messages from mult...
Yitao Duan, John F. Canny
SAC
2006
ACM
15 years 3 months ago
Distributed context management in a mobility and adaptation enabling middleware (MADAM)
CT As computing devices are getting smaller, we tend to bring them everywhere. Consequently the operating conditions of the devices are constantly changing (e.g. changing user requ...
Marius Mikalsen, Nearchos Paspallis, Jacqueline Fl...
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
14 years 11 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
COMSUR
2007
101views more  COMSUR 2007»
14 years 9 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
CONCURRENCY
2007
109views more  CONCURRENCY 2007»
14 years 9 months ago
The Open Grid Computing Environments collaboration: portlets and services for science gateways
: We review the efforts of the Open Grid Computing Environments collaboration. By adopting a general three-tiered architecture based on common standards for portlets and Grid Web S...
Jay Alameda, Marcus Christie, Geoffrey Fox, Joe Fu...