Sciweavers

5324 search results - page 101 / 1065
» Internet Security Protocols
Sort
View
IPPS
2005
IEEE
15 years 3 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
15 years 4 months ago
Internet Users' Beliefs about Government Surveillance - The Role of Social Awareness and Internet Literacy
This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users’ attitudes towards government surveillance in the Internet environment. P...
Tamara Dinev
INFOCOM
2005
IEEE
15 years 3 months ago
A disconnection-tolerant transport for drive-thru Internet environments
Abstract— Today’s mobile, wireless, and ad-hoc communications often exhibit extreme characteristics challenging assumptions underlying the traditional way of end-toend communic...
Jörg Ott, Dirk Kutscher