Sciweavers

621 search results - page 39 / 125
» Security of Internet Location Management
Sort
View
WISEC
2010
ACM
15 years 2 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
CSREASAM
2006
15 years 3 months ago
Flexible Cryptographic Component Design for Secure Web Applications
- Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations...
Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo...
CORR
2010
Springer
68views Education» more  CORR 2010»
15 years 2 months ago
Comparative Study of Protocols Used for Establishing VPN
This is an Internet era. Most of the organizations try to establish their development centers and branch offices across the World. Employees working from their homes are also beco...
P. Venkateswari, T. Purusothaman
SIGUCCS
2000
ACM
15 years 5 months ago
On the Road to Becoming a Statewide ISP
This paper discusses the technical and policy issues that West Virginia Network (WVNET) encountered when it expanded its statewide Internet dialup service through an outsourcing p...
Roman Olynyk
MHCI
2009
Springer
15 years 8 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi