Sciweavers

3504 search results - page 659 / 701
» Secure protocol composition
Sort
View
71
Voted
HUC
2007
Springer
15 years 3 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
79
Voted
AINA
2006
IEEE
15 years 3 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
15 years 3 months ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang
96
Voted
LCN
2006
IEEE
15 years 3 months ago
Privacy-Preserving Quick Authentication in Fast Roaming Networks
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang
VTC
2006
IEEE
107views Communications» more  VTC 2006»
15 years 3 months ago
Architecture of an Always Best Connected Vehicular Communication Gateway
Abstract— MobilitY and CollAboRative Work in European Vehicle Emergency NeTworks (MYCAREVENT) is an European Project of the 6th Framework Program [1], and aims to optimize the Eu...
Erik Weiss, M. Muehleisen, Carl-Herbert Rokitansky...