Sciweavers

164 search results - page 26 / 33
» An Architectural Design for Secure Mobile Remote Macro-Payme...
Sort
View
73
Voted
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 3 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
95
Voted
CASES
2004
ACM
15 years 2 months ago
A low power architecture for embedded perception
Recognizing speech, gestures, and visual features are important interface capabilities for future embedded mobile systems. Unfortunately, the real-time performance requirements of...
Binu K. Mathew, Al Davis, Michael Parker
ACSAC
2004
IEEE
15 years 1 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
WETICE
2002
IEEE
15 years 2 months ago
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
91
Voted
MSWIM
2009
ACM
15 years 4 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...