Sciweavers

259 search results - page 20 / 52
» Study of management on the mobile public key infrastructure
Sort
View
89
Voted
AAAI
2004
14 years 11 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
INFOCOM
2005
IEEE
15 years 3 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
73
Voted
WPES
2006
ACM
15 years 3 months ago
A study on the value of location privacy
This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countrie...
Daniel Cvrcek, Marek Kumpost, Vashek Matyas, Georg...
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
ERCIMDL
2008
Springer
112views Education» more  ERCIMDL 2008»
14 years 11 months ago
Releasing the Power of Digital Metadata: Examining Large Networks of Co-related Publications
Bibliographic metadata plays a key role in scientific literature, not only to summarise and establish the facts of the publication record, but also to track citations between publ...
David Tarrant, Les Carr, Terry R. Payne