Sciweavers

336 search results - page 46 / 68
» Mobile values, new names, and secure communication
Sort
View
ISCI
2008
120views more  ISCI 2008»
14 years 9 months ago
Using cooperative mobile agents to monitor distributed and dynamic environments
Monitoring the changes in data values obtained from the environment (e.g., locations of moving objects) is a primary concern in many fields, as for example in the pervasive comput...
Sergio Ilarri, Eduardo Mena, Arantza Illarramendi
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 1 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
80
Voted
AINA
2009
IEEE
15 years 4 months ago
Enabling Fast Bootstrap of Reputation in P2P Mobile Networks
The easy deployment of P2P self-organized systems has contributed to their wide diffusion and to the definition of a new communication paradigm. Mobile communities can now sponta...
Roberto G. Cascella
COMAD
2009
14 years 7 months ago
Similarity Search in Moving Object Trajectories
The continuous and rapid advent in mobile and communications technology opens the way for new research areas and new applications. Moving Object Databases(MODs) are among the emer...
Omnia Ossama Hoda, M. O. Mokhtar
FC
2010
Springer
191views Cryptology» more  FC 2010»
15 years 1 months ago
Using Sphinx to Improve Onion Routing Circuit Construction
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit constru...
Aniket Kate, Ian Goldberg