Sciweavers

2503 search results - page 362 / 501
» Building Computer Network Attacks
Sort
View
PERCOM
2007
ACM
16 years 1 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
PERCOM
2006
ACM
16 years 1 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
PERCOM
2006
ACM
16 years 1 months ago
Proximity Based Access Control in Smart-Emergency Departments
In this paper, we propose a Proximity Based automated Access Control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administ...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
ICNP
2005
IEEE
15 years 7 months ago
Incentives to Promote Availability in Peer-to-Peer Anonymity Systems
Peer-to-peer (P2P) anonymous communication systems are vulnerable to free-riders, peers that use the system while providing little or no service to others and whose presence limit...
Daniel R. Figueiredo, Jonathan K. Shapiro, Donald ...
120
Voted
ISPA
2005
Springer
15 years 7 months ago
A Generic Approach to Make Structured Peer-to-Peer Systems Topology-Aware
Abstract. With the help of distributed hash tables, the structured peerto-peer system has a short routing path and good extensibility. However, the mismatch between the overlay and...
Tongqing Qiu, Fan Wu, Guihai Chen