Sciweavers

1583 search results - page 229 / 317
» The Quorum Deployment Problem
Sort
View
ESORICS
2008
Springer
15 years 4 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
EUROPAR
2008
Springer
15 years 4 months ago
Complex Queries for Moving Object Databases in DHT-Based Systems
Abstract. Distributed moving object database servers are a feasible solution to the scalability problem of centralized database systems. In this paper we propose a distributed inde...
Cecilia Hernández, M. Andrea Rodrígu...
ACISP
2010
Springer
15 years 4 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila
AAAI
2010
15 years 4 months ago
Security Games with Arbitrary Schedules: A Branch and Price Approach
Security games, and important class of Stackelberg games, are used in deployed decision-support tools in use by LAX police and the Federal Air Marshals Service. The algorithms use...
Manish Jain, Erim Kardes, Christopher Kiekintveld,...
BCSHCI
2007
15 years 4 months ago
Investigating the usability of PDAs with ageing users
Mobile technologies have the potential to enhance the lives of ageing users, especially those who experience a decline in cognitive abilities. However, diminutive devices often pe...
Sheila Mc Carthy, Heather Sayers, Paul McKevitt