Sciweavers

20024 search results - page 3801 / 4005
» Database Management Systems
Sort
View
117
Voted
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 10 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
108
Voted
SOUPS
2009
ACM
15 years 10 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
SOUPS
2009
ACM
15 years 10 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
159
Voted
DATE
2008
IEEE
223views Hardware» more  DATE 2008»
15 years 10 months ago
Cooperative Safety: a Combination of Multiple Technologies
—Governmental Transportation Authorities' interest in Car to Car and Car to Infrastructure has grown dramatically over the last few years in order to increase the road safet...
Raffaele Penazzi, Piergiorgio Capozio, Martin Dunc...
117
Voted
NOMS
2008
IEEE
15 years 9 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
« Prev « First page 3801 / 4005 Last » Next »