Sciweavers

3751 search results - page 577 / 751
» Events in security protocols
Sort
View
109
Voted
IADIS
2004
15 years 2 months ago
Physiology of mobile database: an unconventional database
As the mobility of people increases, anytime, anywhere computing has become a must. The appearance of powerful portable computers, along with advancement in wireless communication...
Imran Khan, Nasir Touheed
IJIT
2004
15 years 2 months ago
Practical Fair Anonymous Undeniable Signatures
We present a new model for undeniable signatures: fair-anonymous undeniable signatures. This protocol can not only preserve the privacy of the signer (i.e. anonymity) but also trac...
Song Han, Elizabeth Chang, Xiaotie Deng, Winson K....
81
Voted
PDPTA
2004
15 years 2 months ago
Web Service Robust GridFTP
In this paper, we discuss reliable and secure file transfer middleware called NaradaBrokering. It is our goal to show that reliability features can be decoupled from the implementa...
Sang Lim, Geoffrey Fox, Shrideep Pallickara, Marlo...
73
Voted
ENTCS
2008
94views more  ENTCS 2008»
15 years 25 days ago
Monitoring External Resources in Java MIDP
We present a Java library for mobile phones which tracks and controls at runtime the use of potentially costly resources, such as premium rate text messages. This improves on the ...
David Aspinall, Patrick Maier, Ian Stark
81
Voted
COMCOM
2006
70views more  COMCOM 2006»
15 years 25 days ago
Secret instantiation in ad-hoc networks
In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those...
Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora