Sciweavers

1381 search results - page 209 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
103
Voted
MIDDLEWARE
2010
Springer
14 years 9 months ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...
NETWORKING
2004
15 years 14 days ago
Detecting and Blocking Unauthorized Access in Wi-Fi Networks
Abstract. Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but p...
Haidong Xia, José Carlos Brustoloni
VIZSEC
2004
Springer
15 years 4 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
LCN
2008
IEEE
15 years 5 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
PERCOM
2006
ACM
14 years 11 months ago
Incorporating Wireless Technology into Virtual Organizations Supporting the Work of Healthcare Teams
This study investigates how a virtual organization can be built in a distributed computing environment which includes wireless technology to support the work of a multi-disciplina...
Mohyuddin, W. A. Gray, David Morrey, Wendy Jones