Sciweavers

3299 search results - page 547 / 660
» Privacy and Trusted Computing
Sort
View
AIL
2004
111views more  AIL 2004»
15 years 4 months ago
Anonymity and software agents: An interdisciplinary challenge
Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit ...
Frances M. T. Brazier, Anja Oskamp, Corien Prins, ...
IJACI
2010
164views more  IJACI 2010»
15 years 2 months ago
Exploring Multi-Path Communication in Hybrid Mobile Ad Hoc Networks
Abstract. Ambient computing requires the integration of multiple mobile heterogeneous networks. Multi-path communication, in such scenarios, can provide reliability and privacy ben...
Roberto Speicys Cardoso, Mauro Caporuscio
TLT
2008
92views more  TLT 2008»
15 years 2 months ago
Lifelong Learner Modeling for Lifelong Personalized Pervasive Learning
Pervasive and ubiquitous computing has the potential to make huge changes in the ways that we will learn throughout our lives. This paper presents a vision for the lifelong user mo...
Judy Kay
INDOCRYPT
2010
Springer
15 years 2 months ago
Getting a Few Things Right and Many Things Wrong
: Radio frequency identification (RFID) is a technology for the automated identification of physical entities using radio frequency transmissions. In the past ten years, RFID syste...
Neal Koblitz
CSUR
2010
373views more  CSUR 2010»
15 years 1 months ago
A survey of confidential data storage and deletion methods
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic stor...
Sarah M. Diesburg, An-I Andy Wang