Sciweavers

3299 search results - page 573 / 660
» Privacy and Trusted Computing
Sort
View
172
Voted
HPDC
2003
IEEE
15 years 9 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
125
Voted
SAC
2003
ACM
15 years 9 months ago
iGrocer- A Ubiquitous and Pervasive Smart Grocery Shopping System
Emerging Smart phones are poised to give a whole new dimension to the way we shop, bank, and go about many of our everyday activities. iGrocer is a smart grocery shopping assistant...
Sangeetha Shekar, Prashant Nair, Abdelsalam Helal
159
Voted
WS
2003
ACM
15 years 9 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
141
Voted
GCC
2003
Springer
15 years 9 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
128
Voted
INDOCRYPT
2001
Springer
15 years 8 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer