Sciweavers

1058 search results - page 124 / 212
» Secure Group Communications Using Key Graphs
Sort
View
116
Voted
ICC
2009
IEEE
112views Communications» more  ICC 2009»
15 years 9 months ago
Towards Secure Spectrum Decision
—The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistic...
Goce Jakimoski, K. P. Subbalakshmi
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
15 years 6 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...
MA
2000
Springer
135views Communications» more  MA 2000»
15 years 6 months ago
Principles of Mobile Maude
Mobile Maude is a mobile agent language extending the rewriting logic language Maude and supporting mobile computation. Mobile Maude uses reflection to obtain a simple and general ...
Francisco Durán, Steven Eker, Patrick Linco...
SPW
2001
Springer
15 years 7 months ago
On the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
CSCW
2004
ACM
15 years 2 months ago
Roles of Orientation in Tabletop Collaboration: Comprehension, Coordination and Communication
Abstract. In order to support co-located collaboration, many researchers are now investigating how to effectively augment tabletops with electronic displays. As far back as 1988, o...
Russell Kruger, M. Sheelagh T. Carpendale, Stacey ...