Sciweavers

110 search results - page 12 / 22
» Secure encounter-based social networks: requirements, challe...
Sort
View
117
Voted
ICETE
2004
253views Business» more  ICETE 2004»
14 years 10 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
TMC
2008
164views more  TMC 2008»
14 years 9 months ago
Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks
Integrating mobile computing and localized user interaction into the Internet requires more than simply overcoming pure routing challenges. Apart from issues such as intermittent c...
Anargyros Garyfalos, Kevin C. Almeroth
86
Voted
ICWS
2003
IEEE
14 years 10 months ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 2 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
95
Voted
GLOBECOM
2010
IEEE
14 years 7 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...