Sciweavers

2363 search results - page 322 / 473
» How Secure is RFID
Sort
View
138
Voted
SDMW
2004
Springer
15 years 10 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
140
Voted
UIALL
2004
Springer
15 years 10 months ago
Multimodal Interaction in Architectural Design Applications
In this paper we report on ongoing experiments with an advanced multimodal system for applications in architectural design. The system supports uninformed users in entering the rel...
Lou Boves, Andre Neumann, Louis Vuurpijl, Louis te...
132
Voted
HICSS
2003
IEEE
141views Biometrics» more  HICSS 2003»
15 years 10 months ago
Understanding the Foundation of Mobile Content Quality A Presentation of a New Research Field
This paper studies some problems regarding mobile content quality (MCQ). Since the reason for communication is to be useful, we think that the only way of creating precise target ...
Pär Landor
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
15 years 10 months ago
Authenticated Access for IPv6 Supported Mobility
Hierarchical Mobile IPv6 (HMIPv6) is a protocol that enhances Mobile IPv6 (MIPv6) with faster handovers. Neither HMIPv6 nor MIPv6 provides ways to authenticate roaming mobile node...
Paal Engelstad, Thomas Haslestad, Fréd&eacu...
NSPW
2003
ACM
15 years 10 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin