Sciweavers

555 search results - page 14 / 111
» Security Issues for Pervasive Personalized Communication Sys...
Sort
View
OTM
2007
Springer
15 years 3 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
CCS
2010
ACM
14 years 9 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
CSREAPSC
2006
14 years 10 months ago
Design and Implementation of SONICA (Service Oriented Network Interoperability for Component Adaptation) for Multimedia Pervasiv
Abstract - Recent advances in multimedia network systems have led to the development of a new generation of applications that associate the use of various multimedia objects. The c...
Hiroshi Hayakawa, Takahiro Koita, Kenya Sato
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 2 months ago
The Impacts of Delphi Communication Structure on Small and Medium Sized Asynchronous Groups: Preliminary Results
Communication structure is a way of improving the effectiveness of group communications by coordinating group members’ individual efforts. This study investigates the use of Del...
Hee-Kyung Cho, Murray Turoff, Starr Roxanne Hiltz
SP
1989
IEEE
15 years 1 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik