Sciweavers

3420 search results - page 162 / 684
» A Language-Based Approach to Security
Sort
View
148
Voted
ECOOPW
1999
Springer
15 years 8 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
VTC
2007
IEEE
150views Communications» more  VTC 2007»
15 years 10 months ago
Antenna Advancement Techniques and Integration of RFID Electronics on Organic Substrates for UHF RFID Applications in Automotive
— In this paper, design requirements and advanced approaches for improved performance UHF radio frequency identification (RFID) tags are presented. Organic substrates are examine...
Li Yang, Amin Rida, Jiexin Li, Manos M. Tentzeris
ISW
2007
Springer
15 years 10 months ago
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
Abstract. The concept of timed-released encryption with pre-open capability (TRE-PC) was introduced by Hwang, Yum and Lee. In a TREPC scheme, a message is encrypted in such a way t...
Alexander W. Dent, Qiang Tang
AINA
2009
IEEE
15 years 9 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
DASC
2006
IEEE
15 years 7 months ago
Runtime Security Verification for Itinerary-Driven Mobile Agents
We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from t...
Zijiang Yang, Shiyong Lu, Ping Yang