Sciweavers

2335 search results - page 401 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
NETWORK
2007
187views more  NETWORK 2007»
15 years 1 months ago
Cooperative and opportunistic transmission for wireless ad hoc networks
Moving toward 4G, wireless ad hoc networks receive growing interest due to users’ provisioning of mobility, usability of services, and seamless communications. In ad hoc network...
Qian Zhang, Qing Chen, Fan Yang, Xuemin Shen, Zhis...
MOBISYS
2005
ACM
16 years 1 months ago
Improving TCP performance over wireless networks with collaborative multi-homed mobile hosts
Multi-homed mobile hosts situated in physical proximity may spontaneously team up to run high-bandwidth applications by pooling their low wireless wide-area network (WWAN) bandwid...
Kyu-Han Kim, Kang G. Shin
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
15 years 7 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
IH
2004
Springer
15 years 7 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 6 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...