Sciweavers

2363 search results - page 404 / 473
» How Secure is RFID
Sort
View
CHI
2010
ACM
15 years 11 months ago
Deliberate interactions: characterizing technology use in Nairobi, Kenya
We present results from a qualitative study examining how professionals living and working in Nairobi, Kenya regularly use ICT in their everyday lives. There are two contributions...
Susan Wyche, Thomas N. Smyth, Marshini Chetty, Pau...
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
15 years 11 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
ICDE
2009
IEEE
129views Database» more  ICDE 2009»
15 years 11 months ago
A Static Analysis Framework for Database Applications
—Database developers today use data access APIs such as ADO.NET to execute SQL queries from their application. These applications often have security problems such as SQL injecti...
Arjun Dasgupta, Vivek R. Narasayya, Manoj Syamala
SC
2009
ACM
15 years 11 months ago
Using dynamic accounts to enable access to advanced resources through science gateways
Science Gateways have emerged as a valuable solution for providing large numbers of users with access to advanced computing resources. Additionally, they can hide many of the comp...
Joseph A. Insley, Ti Leggett, Michael E. Papka
FOSSACS
2009
Springer
15 years 11 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...