Sciweavers

25 search results - page 5 / 5
» Proximity Based Access Control in Smart-Emergency Department...
Sort
View
CCS
2007
ACM
13 years 11 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
NSDI
2004
13 years 7 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
IEEESCC
2007
IEEE
13 years 12 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
SEFM
2007
IEEE
13 years 12 months ago
An AOP Extended Lambda-Calculus
This paper presents an implicitly-typed functional, aspect-oriented programming language: λ AOP. The main contribution of the paper is a semantics for λ AOP advice weaving. The ...
Dima Alhadidi, Nadia Belblidia, Mourad Debbabi, Pr...
ELPUB
2000
ACM
13 years 10 months ago
Multimedia Cd-Rom as a Medium for Manuscript Preservation and Dissemination: The Design and Development of "Treasures of Islam"
The paper discusses the use of electronic publishing for the preservation and dissemination of rare manuscript material. It is based both upon the authors’ earlier work on multi...
Andrew Large, Jamshid Beheshti, Haidar Moukdad