Sciweavers

2454 search results - page 27 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 4 months ago
An Architecture for Network Layer Privacy
— We present an architecture for the provision of network layer privacy based on the SHIM6 multihoming protocol. In its basic form, the architecture prevents on-path eavesdropper...
Marcelo Bagnulo, Alberto García-Martí...
56
Voted
SIGCOMM
2010
ACM
14 years 9 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
SIGITE
2004
ACM
15 years 3 months ago
How information technology professionals keep from being outsourced or offshored
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
Ron Fulbright, Richard L. Routh
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 2 months ago
Organizational Memory Systems: Challenges for Information Technology
Organizations subsist on communication and coordination. An organization’s ability to remember and learn from its past, in other words, its ability to use its “organizational ...
Michael E. Atwood