Sciweavers

1757 search results - page 299 / 352
» Secure Content Validation
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 11 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ASE
2005
145views more  ASE 2005»
14 years 11 months ago
Developing Ambient Intelligence Systems: A Solution based on Web Services
Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectiv...
Valérie Issarny, Daniele Sacchetti, Ferda T...
WICOMM
2008
108views more  WICOMM 2008»
14 years 11 months ago
The multimedia broadcast/multicast service
Abstract-- This article provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks. We first outline t...
George Xylomenos, Vasilis Vogkas, George Thanos
SAC
2008
ACM
14 years 10 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
116
Voted
TKDE
2008
154views more  TKDE 2008»
14 years 10 months ago
Watermarking Relational Databases Using Optimization-Based Techniques
Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In th...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor