Sciweavers

2560 search results - page 158 / 512
» Securing VO Management
Sort
View
156
Voted
ICON
2007
IEEE
15 years 11 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
CODASPY
2012
14 years 11 days ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
139
Voted
AINA
2009
IEEE
15 years 9 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
SPIRE
2001
Springer
15 years 9 months ago
Adding Security to Compressed Information Retrieval Systems
Word-based Huffman coding has widespread use in information retrieval systems. Besides its compressing power, it also enables the implementation of both indexing and searching sch...
Ruy Luiz Milidiú, C. Gomes de Mello, J. Fer...
CAISE
2006
Springer
15 years 8 months ago
Modeling Airport Security Regulations in Focal
We describe the formal models of two standards related to airport security: one at the international level and the other at the European level. These models are expressed using the...
David Delahaye, Jean-Frédéric &Eacut...