Sciweavers

366 search results - page 48 / 74
» A Door Access Control System with Mobile Phones
Sort
View
DAC
2007
ACM
15 years 10 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
MOBIHOC
2002
ACM
15 years 9 months ago
Performance evaluation of a fair backoff algorithm for IEEE 802.11 DFWMAC
Due to hidden terminals and a dynamic topology, contention among stations in an ad-hoc network is not homogeneous. Some stations are at a disadvantage in opportunity of access to ...
Zuyuan Fang, Brahim Bensaou, Yu Wang
IJDE
2006
95views more  IJDE 2006»
14 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
COMPSAC
2002
IEEE
15 years 2 months ago
Personalized Redirection of Communication
Universal access to information and data is an important goal of current research. Previously different forms of information and data, captured by different devices or held on dif...
Yuping Yang, M. Howard Williams
SOUPS
2010
ACM
15 years 1 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell