Sciweavers

1587 search results - page 181 / 318
» Access Control for Shared Resources
Sort
View
RTSS
2009
IEEE
15 years 7 months ago
Rapid Early-Phase Virtual Integration
In complex hard real-time systems with tight constraints on system resources, small changes in one component of a system can cause a cascade of adverse effects on other parts of t...
Sibin Mohan, Min-Young Nam, Rodolfo Pellizzoni, Lu...
ICB
2007
Springer
135views Biometrics» more  ICB 2007»
15 years 7 months ago
Feeling Is Believing: A Secure Template Exchange Protocol
We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol ...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
SAINT
2006
IEEE
15 years 7 months ago
Comparison of Transmission Schemes for Framed ALOHA based RFID Protocols
The performance of RFID anti-collision protocols that are based on framed ALOHA depends on a transmission scheme that controls access to the shared channel. In this paper, we outl...
Christian Floerkemeier, Matthias Wille
120
Voted
POPL
2000
ACM
15 years 4 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
117
Voted
SIGMOD
2003
ACM
146views Database» more  SIGMOD 2003»
16 years 1 months ago
The Piazza peer data management project
A major problem in today's information-driven world is that sharing heterogeneous, semantically rich data is incredibly difficult. Piazza is a peer data management system tha...
Igor Tatarinov, Zachary G. Ives, Jayant Madhavan, ...