Sciweavers

2363 search results - page 87 / 473
» How Secure is RFID
Sort
View
PERVASIVE
2009
Springer
15 years 11 months ago
PL-Tags: Detecting Batteryless Tags through the Power Lines in a Building
We present a system, called PL-Tags, for detecting the presence of batteryless tags in a building or home through the power lines. The excitation (or interrogation) and detection o...
Shwetak N. Patel, Erich P. Stuntebeck, Thomas Robe...
IVA
2005
Springer
15 years 10 months ago
Using Real Objects to Communicate with Virtual Characters
We present an interactive installation with life-size virtual agents that inform, entertain, encourage, and assist visitors during the process of building a car. It will be install...
Patrick Gebhard, Martin Klesen
ICISC
2007
95views Cryptology» more  ICISC 2007»
15 years 6 months ago
Security-Preserving Asymmetric Protocol Encapsulation
Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different ro...
Raphael C.-W. Phan, Serge Vaudenay
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 11 months ago
Web Application Scanners: Definitions and Functions
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
Elizabeth Fong, Vadim Okun
GI
2001
Springer
15 years 9 months ago
Building ALL-IP Based Virtual Private Networks in Mobile Environment
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...