Sciweavers

7 search results - page 2 / 2
» Towards Robust Low Cost Authentication for Pervasive Devices
Sort
View
TDSC
2008
125views more  TDSC 2008»
13 years 4 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
JCM
2007
162views more  JCM 2007»
13 years 4 months ago
Opportunistic Spectrum Access in Fading Channels Through Collaborative Sensing
— Spectrum scarcity is becoming a major issue for service providers interested in either deploying new services or enhancing the capacity for existing applications. On the other ...
Amir Ghasemi, Elvino S. Sousa