Sciweavers

2363 search results - page 125 / 473
» How Secure is RFID
Sort
View
FSTTCS
2009
Springer
15 years 11 months ago
Non-Local Box Complexity and Secure Function Evaluation
ABSTRACT. A non-local box is an abstract device into which Alice and Bob input bits x and y respectively and receive outputs a and b respectively, where a, b are uniformly distribu...
Marc Kaplan, Iordanis Kerenidis, Sophie Laplante, ...
IPSN
2010
Springer
15 years 11 months ago
A vehicular surveillance and sensing system for car security and tracking applications
In this paper, we propose a Vehicular Surveillance and Sensing System (VS3 ), which targets at car security and tracking applications. VS3 can be triggered by events detected insi...
Lien-Wu Chen, Kun-Ze Syue, Yu-Chee Tseng
134
Voted
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 11 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
146
Voted
FMCO
2004
Springer
15 years 10 months ago
Games with Secure Equilibria
In 2-player non-zero-sum games, Nash equilibria capture the options for rational behavior if each player attempts to maximize her payoff. In contrast to classical game theory, we ...
Krishnendu Chatterjee, Thomas A. Henzinger, Marcin...
FGCS
2007
172views more  FGCS 2007»
15 years 4 months ago
From access and integration to mining of secure genomic data sets across the Grid
The UK Department of Trade and Industry (DTI) funded BRIDGES project (Biomedical Research Informatics Delivered by Grid Enabled Services) has developed a Grid infrastructure to su...
Richard O. Sinnott