Sciweavers

251 search results - page 23 / 51
» Privacy and HCI: methodologies for studying privacy issues
Sort
View
DRMTICS
2005
Springer
15 years 5 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov
IJWMC
2006
112views more  IJWMC 2006»
14 years 11 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
HICSS
2006
IEEE
137views Biometrics» more  HICSS 2006»
15 years 5 months ago
Identity Management and Data Sharing in the European Union
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessit...
Benoît Otjacques, Patrik Hitzelberger, Ferna...
CASCON
2006
109views Education» more  CASCON 2006»
15 years 1 months ago
Legal research topics within services sciences
The paper presents a study to define some of the most important legal topics that need to be included in the Services Sciences' research agenda. To analyze what sort of legal...
Olli Pitkänen
ICDE
2002
IEEE
141views Database» more  ICDE 2002»
16 years 1 months ago
Providing Database as a Service
In this paper, we explore a new paradigm for data management in which a third party service provider hosts "database as a service" providing its customers seamless mecha...
Balakrishna R. Iyer, Hakan Hacigümüs, Sh...