Sciweavers

3458 search results - page 577 / 692
» Abstracting Control
Sort
View
ESORICS
2010
Springer
14 years 11 months ago
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and...
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
FC
2010
Springer
150views Cryptology» more  FC 2010»
14 years 11 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
FC
2010
Springer
260views Cryptology» more  FC 2010»
14 years 11 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
GG
2010
Springer
14 years 11 months ago
Local Confluence for Rules with Nested Application Conditions
Abstract. Local confluence is an important property in many rewriting and transformation systems. The notion of critical pairs is central for being able to verify local confluence ...
Hartmut Ehrig, Annegret Habel, Leen Lambers, Ferna...
HAPTICS
2008
IEEE
14 years 11 months ago
A Study on the Role of Force Feedback for Teleoperation of Industrial Overhead Crane
Abstract. In this paper, a study on the role of force feedback for teleoperation of industrial overhead crane is presented. Teleoperation of industrial crane was described and anal...
Ildar Farkhatdinov, Jee-Hwan Ryu