Sciweavers

2454 search results - page 190 / 491
» Privacy in the Information and Communications Technologies
Sort
View
IRI
2003
IEEE
15 years 7 months ago
An Architectural Pattern For Adaptable Middleware Infrastructure
- Middleware technologies change so rapidly that designers must adapt existing software architectures to incorporate new emerging ones. This paper proposes tectural pattern and gui...
Arturo Sanchez, Jason Mitchell
IMC
2006
ACM
15 years 7 months ago
The need for cross-layer information in access point selection algorithms
The low price of commodity wireless LAN cards and access points (APs) has resulted in the rich proliferation of high density WLANs in enterprise, academic environments, and public ...
Karthikeyan Sundaresan, Konstantina Papagiannaki
ICDCS
2010
IEEE
15 years 5 months ago
Fingerprinting Mobile User Positions in Sensor Networks
- We demonstrate that the network flux over the sensor network provides us fingerprint information about the mobile users within the field. Such information is exoteric in the phys...
Mo Li, Xiaoye Jiang, Leonidas J. Guibas
109
Voted
SOUPS
2006
ACM
15 years 7 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
CIKM
2008
Springer
15 years 3 months ago
Privacy-preserving data publishing for horizontally partitioned databases
There is an increasing need for sharing data repositories containing personal information across multiple distributed, possibly untrusted, and private databases. Such data sharing...
Pawel Jurczyk, Li Xiong