Sciweavers

366 search results - page 36 / 74
» A Door Access Control System with Mobile Phones
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
PERVASIVE
2006
Springer
14 years 9 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
TWC
2008
107views more  TWC 2008»
14 years 9 months ago
An optimal soft handoff algorithm for rayleigh fading channels
In this paper, we design and analyze a soft handoff algorithm for code-division multiple access (CDMA) systems in a Rayleigh fading environment. For each mobile, this algorithm sel...
Sae-Young Chung, Pierre A. Humblet
102
Voted
ICDCSW
2005
IEEE
15 years 3 months ago
Parallel Bindings in Distributed Multimedia Systems
Today’s multimedia environments are characterized by different stationary and a growing number of mobile devices, like PDAs or even mobile phones. To meet their requirements reg...
Michael Repplinger, Florian Winter, Marco Lohse, P...
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 7 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta