Sciweavers

98 search results - page 18 / 20
» Securing RFID Systems by Detecting Tag Cloning
Sort
View
ACSAC
2009
IEEE
14 years 14 days ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
NAR
2008
122views more  NAR 2008»
13 years 5 months ago
The Rice Annotation Project Database (RAP-DB): 2008 update
The Rice Annotation Project Database (RAP-DB) was created to provide the genome sequence assembly of the International Rice Genome Sequencing Project (IRGSP), manually curated ann...
HUC
2007
Springer
13 years 11 months ago
A Long-Term Evaluation of Sensing Modalities for Activity Recognition
We study activity recognition using 104 hours of annotated data collected from a person living in an instrumented home. The home contained over 900 sensor inputs, including wired r...
Beth Logan, Jennifer Healey, Matthai Philipose, Em...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 1 days ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
MONET
2007
95views more  MONET 2007»
13 years 5 months ago
A Pervasive Computing System for the Operating Room of the Future
We describe a prototype Context Aware Perioperative Information System to capture and interpret data in an operating room of the future. The captured data is used to construct the...
Sheetal K. Agarwal, Anupam Joshi, Timothy W. Finin...