Sciweavers

2209 search results - page 396 / 442
» Language Based Secure Communication
Sort
View
INFOCOM
2010
IEEE
15 years 13 days ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
KBSE
2005
IEEE
15 years 7 months ago
Clearwater: extensible, flexible, modular code generation
Distributed applications typically interact with a number of heterogeneous and autonomous components that evolve independently. Methodical development of such applications can ben...
Galen S. Swint, Calton Pu, Gueyoung Jung, Wenchang...
ASIAN
2003
Springer
111views Algorithms» more  ASIAN 2003»
15 years 7 months ago
Unreliable Failure Detectors via Operational Semantics
Abstract. The concept of unreliable failure detectors for reliable distributed systems was introduced by Chandra and Toueg as a fine-grained means to add weak forms of synchrony i...
Uwe Nestmann, Rachele Fuzzati
WWW
2009
ACM
16 years 2 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
MOBISYS
2007
ACM
16 years 1 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu