Sciweavers

2200 search results - page 287 / 440
» Hop Integrity in Computer Networks
Sort
View
DAC
1998
ACM
16 years 4 months ago
WELD - An Environment for Web-based Electronic Design
Increasing size and geographical separation of design data and teams has created a need for a network-based electronic design environment that is scaleable, adaptable, secure, hig...
Francis L. Chan, Mark D. Spiller, A. Richard Newto...
124
Voted
WISTP
2010
Springer
15 years 10 months ago
Trust in Peer-to-Peer Content Distribution Protocols
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
145
Voted
IWANN
2007
Springer
15 years 9 months ago
Intelligent Healthcare Managing: An Assistive Technology Approach
This paper is about the key role of Personalization through Ambient Intelligence in the development of Assistive Technologies for the elders. Ambient Intelligence implies three rel...
Ulises Cortés, Cristina Urdiales, Roberta A...
132
Voted
POLICY
2007
Springer
15 years 9 months ago
XACML Function Annotations
XACML is being increasingly adopted in large enterprise systems for specifying access control policies. However, the efficient analysis and integration of multiple policies in suc...
Prathima Rao, Dan Lin, Elisa Bertino
138
Voted
P2P
2006
IEEE
15 years 9 months ago
Route Fingerprinting in Anonymous Communications
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only ...
George Danezis, Richard Clayton