Sciweavers

5 search results - page 1 / 1
» Requiring Strong Credentials: What's Taking So Long
Sort
View
ITPRO
2010
64views more  ITPRO 2010»
13 years 4 months ago
Requiring Strong Credentials: What's Taking So Long?
H. Gilbert Miller, James L. Fisher
WPES
2003
ACM
13 years 11 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
DAC
1999
ACM
13 years 10 months ago
Panel: What is the Proper System on Chip Design Methodology
ion model or flexible PCB solutions cannot offer a valid solution for the next millinium SoCs . James G. Dougherty, Integrated Systems Silicon LTD, Belfast, Northern Ireland ISS an...
Richard Goering, Pierre Bricaud, James G. Doughert...
JFP
2007
136views more  JFP 2007»
13 years 5 months ago
Practical type inference for arbitrary-rank types
Haskell’s popularity has driven the need for ever more expressive type system features, most of which threaten the decidability and practicality of Damas-Milner type inference. ...
Simon L. Peyton Jones, Dimitrios Vytiniotis, Steph...
GLOBECOM
2007
IEEE
14 years 2 days ago
A Novel Distributed Scheduling Algorithm for Wireless Mesh Networks
— Wireless multi-hop, mesh networks are being considered as a candidate to backhaul data traffic from access networks to the wired Internet. These mesh networks are referred to a...
Yun Hou, Kin K. Leung