Sciweavers

1583 search results - page 229 / 317
» The Quorum Deployment Problem
Sort
View
ESORICS
2008
Springer
14 years 11 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
EUROPAR
2008
Springer
14 years 11 months ago
Complex Queries for Moving Object Databases in DHT-Based Systems
Abstract. Distributed moving object database servers are a feasible solution to the scalability problem of centralized database systems. In this paper we propose a distributed inde...
Cecilia Hernández, M. Andrea Rodrígu...
ACISP
2010
Springer
14 years 11 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila
AAAI
2010
14 years 11 months ago
Security Games with Arbitrary Schedules: A Branch and Price Approach
Security games, and important class of Stackelberg games, are used in deployed decision-support tools in use by LAX police and the Federal Air Marshals Service. The algorithms use...
Manish Jain, Erim Kardes, Christopher Kiekintveld,...
BCSHCI
2007
14 years 11 months ago
Investigating the usability of PDAs with ageing users
Mobile technologies have the potential to enhance the lives of ageing users, especially those who experience a decline in cognitive abilities. However, diminutive devices often pe...
Sheila Mc Carthy, Heather Sayers, Paul McKevitt