Sciweavers

348 search results - page 47 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
RTCSA
2007
IEEE
15 years 8 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
APCHI
1998
IEEE
15 years 6 months ago
A Framework for Event-Driven Demonstration based on the Java Toolkit
An event-driven demonstration is to show the behavior of an application by re-executing the captured events. It is used to provide help regarding how an application works because ...
Motoki Miura, Jiro Tanaka
AINA
2007
IEEE
15 years 8 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
WS
2004
ACM
15 years 7 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
WWW
2010
ACM
15 years 9 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...