Sciweavers

981 search results - page 52 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
JUCS
2010
132views more  JUCS 2010»
14 years 12 months ago
A Mobile Intelligent Interruption Management System
: Mobile phones have become the most hated device that people cannot live without. For its primary usage as a communication device, it has surpassed any other medium. But it comes ...
Sina Zulkernain, Praveen Madiraju, Sheikh Iqbal Ah...
ECWEB
2003
Springer
114views ECommerce» more  ECWEB 2003»
15 years 6 months ago
Enhancing E-commerce Security Using GSM Authentication
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...
Vorapranee Khu-smith, Chris J. Mitchell
ATAL
2007
Springer
15 years 7 months ago
An agent-based approach for privacy-preserving recommender systems
Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an ess...
Richard Cissée, Sahin Albayrak
WORDS
2003
IEEE
15 years 6 months ago
A Resource and QoS Management Framework for a Real-Time Event System in Mobile Ad Hoc Environments
A new class of applications can now be envisaged with the emergence of both mobile ad hoc computing and ubiquitous computing. Applications of such kind are characterised by being ...
Hector A. Duran-Limon, Gordon S. Blair, Adrian Fri...
ACSAC
2005
IEEE
15 years 7 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani