Sciweavers

6844 search results - page 1250 / 1369
» Web Service Security
Sort
View
SAC
2008
ACM
14 years 9 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
INFOCOM
2010
IEEE
14 years 8 months ago
Safeguarding Data Delivery by Decoupling Path Propagation and Adoption
—False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed an...
Mingui Zhang, Bin Liu, Beichuan Zhang
JFP
2010
142views more  JFP 2010»
14 years 8 months ago
Linear type theory for asynchronous session types
Session types support a type-theoretic formulation of structured patterns of communication, so that the communication behaviour of agents in a distributed system can be verified ...
Simon J. Gay, Vasco Thudichum Vasconcelos
PERCOM
2010
ACM
14 years 8 months ago
Exploring quality in multisensor pervasive systems - a localization case study
This paper addresses quality vs. cost tradeoffs in multisensor pervasive spaces. Specifically, we focus on a case study that uses location sensing in instrumented pervasive spaces ...
Stefano Bonetti, Sharad Mehrotra, Nalini Venkatasu...
RFIDSEC
2010
14 years 8 months ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
« Prev « First page 1250 / 1369 Last » Next »