Sciweavers

455 search results - page 41 / 91
» From MEMS Devices to Smart Integrated Systems
Sort
View
CODES
2006
IEEE
15 years 6 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
ICDCSW
2003
IEEE
15 years 5 months ago
Gateway: A Message Hub with Store-and-Forward Messaging in Mobile Networks
To obtain good performance in messaging over mobile networks, we have developed a Gateway. Gateway is a message hub that transmits information using store-and-forward messaging an...
Eiko Yoneki, Jean Bacon
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 4 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
FODO
1989
Springer
164views Algorithms» more  FODO 1989»
15 years 4 months ago
ITOSS: An Integrated Toolkit For Operating System Security
d Abstract) Michael Rabin Aiken Computation Laboratory Harvard University Cambridge, MA 02138 J. D. Tygar School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213...
Michael O. Rabin, J. D. Tygar
79
Voted
ECIS
2001
15 years 1 months ago
An electronic polling service to support public awareness using web technologies
This paper presents a Web-based, database-oriented application called "Electronic Polling", a smart way to support voting on common subjects in which all people of a Loc...
Christos Bouras, Nikolaos Katris, Vassilis Trianta...