Sciweavers

1530 search results - page 190 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
WWW
2008
ACM
16 years 4 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
WWW
2008
ACM
16 years 4 months ago
Using CEP technology to adapt messages exchanged by web services
Web service may be unable to interact with each other because of incompatibilities between their interfaces. In this paper, we present an event driven approach which aims at adapt...
Yehia Taher, Marie-Christine Fauvet, Marlon Dumas,...
129
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
A local knowledge base for service oriented access network selection
Service oriented access in a multi-application, multi-access network environment poses interesting research challenges. One of these challenges refers to cross-layer interoperabil...
Carolina Fortuna, Mihael Mohorcic
131
Voted
DANCE
2002
IEEE
15 years 8 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...
144
Voted
HUC
2009
Springer
15 years 8 months ago
Privately querying location-based services with SybilQuery
To usefully query a location-based service, a mobile device must typically present its own location in its query to the server. This may not be acceptable to clients that wish to ...
Pravin Shankar, Vinod Ganapathy, Liviu Iftode