Sciweavers

1992 search results - page 327 / 399
» On the (limited) power of non-equivocation
Sort
View
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
15 years 7 months ago
Context-Awareness on Mobile Devices - the Hydrogen Approach
Information about the user's environment offers new opportunities and exposes new challenges in terms of time-aware, location-aware, device-aware and personalized application...
Thomas Hofer, Wieland Schwinger, Mario Pichler, Ge...
SISW
2003
IEEE
15 years 7 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
CASES
2003
ACM
15 years 7 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
JCDL
2003
ACM
231views Education» more  JCDL 2003»
15 years 7 months ago
Acquisition, Representation, Query and Analysis of Spatial Data: A Demonstration 3D Digital Library
The increasing power of techniques to model complex geometry and extract meaning from 3D information create complex data that must be described, stored, and displayed to be useful...
Jeremy Rowe, Anshuman Razdan, Arleyn Simon
SPAA
2003
ACM
15 years 7 months ago
On local algorithms for topology control and routing in ad hoc networks
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any fixed infrastructure. Indeed, an important task of an ad hoc network...
Lujun Jia, Rajmohan Rajaraman, Christian Scheidele...