Sciweavers

2363 search results - page 358 / 473
» How Secure is RFID
Sort
View
CORR
2000
Springer
138views Education» more  CORR 2000»
15 years 4 months ago
Towards rule-based visual programming of generic visual systems
This paper illustrates how the diagram programming language DIAPLAN can be used to program visual systems. DIAPLAN is a visual rulebased language that is founded on the computation...
Berthold Hoffmann, Mark Minas
SAJ
2002
92views more  SAJ 2002»
15 years 4 months ago
An access control architecture for XML documents in workflow environments
The eXtensible Markup Language (XML) are being upheld as having the potential to change the way business is conducted. This will be effected by changing the way in which informati...
Reinhardt A. Botha, Jan H. P. Eloff
EKAW
2010
Springer
15 years 3 months ago
Representing, Proving and Sharing Trustworthiness of Web Resources Using Veracity
The World Wide Web has evolved into a distributed network of web applications facilitating the publication of information on a large scale. Judging whether such information can be ...
Grégoire Burel, Amparo Elizabeth Cano, Matt...
GLOBECOM
2010
IEEE
15 years 2 months ago
Statistical Framework for Source Anonymity in Sensor Networks
In this work, we investigate the security of anonymous wireless sensor networks. To lay down the foundations of a formal framework, we propose a new model for analyzing and evalua...
Basel Alomair, Andrew Clark, Jorge Cuéllar,...
155
Voted
PERCOM
2010
ACM
15 years 2 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis