Sciweavers

135 search results - page 22 / 27
» Privacy Requirements in Identity Management Solutions
Sort
View
ADHOCNOW
2008
Springer
15 years 3 months ago
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care w...
Dave Singelée, Benoît Latré, B...
ACSAC
2003
IEEE
15 years 2 months ago
MLS-PCA: A High Assurance Security Architecture for Future Avionics
1 DOD Joint Vision 2020 (JV2020) is the integrated multi-service planning document for conduct among coalition forces of future warfare. It requires the confluence of a number of k...
Clark Weissman
105
Voted
CODASPY
2012
13 years 5 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
ICSNC
2007
IEEE
15 years 3 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 3 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...