Sciweavers

43 search results - page 5 / 9
» Enabling Secure Communication over Existing Peer-to-Peer Fra...
Sort
View
JCP
2007
122views more  JCP 2007»
14 years 9 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 16 hour ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
BXML
2004
14 years 11 months ago
Using semantic Web services for ad hoc collaboration in virtual teams
: The system presented in this paper shows an alternative solution for the communication problem in virtual teams. Although it does not address the full bandwidth of tasks of an gr...
Matthias Flügge, Kay-Uwe Schmidt
ESORICS
2000
Springer
15 years 1 months ago
A Full Bandwidth ATM Firewall
The ATM technology has been specified to provide users with the ability to request quality of service (QoS) for their applicatio ns and to enable high speed communications. Howeve...
Olivier Paul, Maryline Laurent, Sylvain Gombault
HUMAN
2003
Springer
15 years 2 months ago
Dynamic Deployment of Software Defined Radio Components for Mobile Wireless Internet Applications
Abstract. Software Defined Radio (SDR) is a key enabling technology for mobile wireless Internet. SDR represents unique opportunity to provide Internet connectivity to handheld dev...
Saehwa Kim, Jamison Masse, Seongsoo Hong