Sciweavers

2363 search results - page 124 / 473
» How Secure is RFID
Sort
View
OTM
2004
Springer
15 years 10 months ago
Application of Grid Security to Personal Distributed Environments
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile...
Allan Tomlinson, Scarlet Schwiderski-Grosche
IFIP
2010
Springer
14 years 11 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...
124
Voted
INFOCOM
2005
IEEE
15 years 10 months ago
Secure positioning of wireless devices with application to sensor networks
Abstract— So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning tec...
Srdjan Capkun, Jean-Pierre Hubaux
DAGSTUHL
2007
15 years 6 months ago
Civitas: A Secure Remote Voting System
Civitas is the first implementation of a coercion-resistant, universally verifiable, remote voting scheme. This paper describes the design of Civitas, details the cryptographic ...
Michael E. Clarkson, Stephen Chong, Andrew C. Myer...
126
Voted
FMOODS
2006
15 years 6 months ago
Security Issues in Service Composition
Abstract. We use a distributed, enriched -calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...