Sciweavers

22 search results - page 5 / 5
» Orthrus: efficient software integrity protection on multi-co...
Sort
View
CCS
2008
ACM
13 years 7 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
AC
2008
Springer
13 years 5 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos