Sciweavers

621 search results - page 3 / 125
» Security of Internet Location Management
Sort
View
102
Voted
SIGCOMM
2010
ACM
14 years 12 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
129
Voted
ACSW
2003
15 years 1 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
74
Voted
ECSA
2008
Springer
15 years 1 months ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
98
Voted
INFOCOM
1999
IEEE
15 years 4 months ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...
74
Voted
NDSS
1998
IEEE
15 years 3 months ago
Trust Management and Internet Client Security
Blair Dillaway