Sciweavers

2363 search results - page 146 / 473
» How Secure is RFID
Sort
View
EUROSSC
2006
Springer
15 years 8 months ago
Towards Hovering Information
This paper introduces a new concept of information that can exist in a mobile environment with no fixed infrastructure and centralized servers, which we call the Hovering Informati...
Alfredo A. Villalba Castro, Dimitri Konstantas
WICON
2008
15 years 6 months ago
SAMPL: a simple aggregation and message passing layer for sensor networks
In recent years, wireless sensor networking has shown great promise in applications ranging from industrial control, environmental monitoring and inventory tracking. Given the res...
Anthony Rowe, Karthik Lakshmanan, Ragunathan Rajku...
148
Voted
ICSE
2008
IEEE-ACM
16 years 5 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ICDS
2009
IEEE
15 years 12 months ago
Security and User Guidelines for the Design of the Future Networked Systems
—Emergence of new networking technologies and paradigms provides users multitude of ways to communicate with each others and exchange information irrespective of time and place. ...
Seppo Heikkinen, Sari Kinnari, Kari Heikkinen
SIGCOMM
2009
ACM
15 years 11 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...