Sciweavers

2363 search results - page 98 / 473
» How Secure is RFID
Sort
View
ASIACRYPT
2005
Springer
15 years 10 months ago
Modular Security Proofs for Key Agreement Protocols
The security of key agreement protocols has traditionally been notoriously hard to establish. In this paper we present a modular approach to the construction of proofs of security ...
Caroline Kudla, Kenneth G. Paterson
TMC
2008
83views more  TMC 2008»
15 years 4 months ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...
SIGMOD
2009
ACM
218views Database» more  SIGMOD 2009»
16 years 4 months ago
DejaVu: declarative pattern matching over live and archived streams of events
DejaVu is an event processing system that integrates declarative pattern matching over live and archived streams of events on top of a novel system architecture. We propose to dem...
Nihal Dindar, Baris Güç, Patrick Lau, ...
PERVASIVE
2006
Springer
15 years 4 months ago
The Design of a Portable Kit of Wireless Sensors for Naturalistic Data Collection
In this paper, we introduce MITes, a flexible kit of wireless sensing devices for pervasive computing research in natural settings. The sensors have been optimized for ease of use,...
Emmanuel Munguia Tapia, Stephen S. Intille, Louis ...
143
Voted
HCI
2009
15 years 2 months ago
Augmenting Sticky Notes as an I/O Interface
The design and implementation of systems that combine both the utilities of the digital world as well as intrinsic affordances of traditional artifacts are challenging. In this pap...
Pranav Mistry, Pattie Maes