Sciweavers

160 search results - page 12 / 32
» Secure Information Flow in Mobile Bootstrapping Process
Sort
View
INFOCOM
2012
IEEE
13 years 2 months ago
Secure top-k query processing via untrusted location-based service providers
Abstract—This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosiv...
Rui Zhang 0007, Yanchao Zhang, Chi Zhang
118
Voted
ADHOCNOW
2004
Springer
15 years 5 months ago
Consensus with Unknown Participants or Fundamental Self-Organization
Abstract. We consider the problem of bootstrapping self-organized mobile ad hoc networks (MANET), i.e. reliably determining in a distributed and self-organized manner the services ...
David Cavin, Yoav Sasson, André Schiper
DBSEC
2011
245views Database» more  DBSEC 2011»
14 years 3 months ago
Multilevel Secure Data Stream Processing
Abstract. With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed t...
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
CIA
1998
Springer
15 years 3 months ago
Enhancing Mobile Agents with Electronic Commerce Capabilities
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...
SIGOPSE
1998
ACM
15 years 3 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau