Sciweavers

2904 search results - page 391 / 581
» Internet Infrastructure Security
Sort
View
SAINT
2007
IEEE
15 years 10 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
OTM
2007
Springer
15 years 10 months ago
Compiler Assisted Elliptic Curve Cryptography
Abstract. Although cryptographic implementation tasks are often undertaken by expert programmers, a plethora of performance and security driven options, as well as more mundane sof...
Manuel Barbosa, Andrew Moss, Dan Page
WIKIS
2005
ACM
15 years 9 months ago
SmallWiki: a meta-described collaborative content management system
Wikis are often implemented using string-based approaches to parse and generate their pages. While such approaches work well for simple wikis, they hamper the customization and ad...
Stéphane Ducasse, Lukas Renggli, Roel Wuyts
132
Voted
IEEEAMS
2003
IEEE
15 years 9 months ago
Navigating in the Storm: Using Astrolabe for Distributed Self-Configuration, Monitoring and Adaptation
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to build applications that can configure themse...
Kenneth P. Birman, Robbert van Renesse, James Kauf...
ESWS
2010
Springer
15 years 9 months ago
A Generic Approach for Correcting Access Restrictions to a Consequence
Recent research has shown that annotations are useful for representing access restrictions to the axioms of an ontology and their implicit consequences. Previous work focused on as...
Martin Knechtel, Rafael Peñaloza