Sciweavers

1462 search results - page 51 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
EUC
2006
Springer
15 years 5 months ago
DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers
Abstract. Advances in wireless and mobile communication technologies have enabled the development of various RFID-based systems and applications in addition to the extension of the...
Kwang-il Hwang, Kyung Tae Kim, Doo Seop Eom
96
Voted
SIGOPSE
1994
ACM
15 years 6 months ago
Application-Aware Adaptation for Mobile Computing
This paper identifies application-aware adaptation as an essential capability of mobile clients, and provides an overview of Odyssey, an architecture that supports this capability...
Mahadev Satyanarayanan, Brian Noble, Puneet Kumar,...
114
Voted
IEEEARES
2008
IEEE
15 years 8 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...
123
Voted
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 8 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
110
Voted
ADHOCNOW
2006
Springer
15 years 8 months ago
Threats to Security in DSRC/WAVE
Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the message...
Christine Laurendeau, Michel Barbeau