Sciweavers

3299 search results - page 554 / 660
» Privacy and Trusted Computing
Sort
View
MOBICOM
2010
ACM
15 years 4 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
GI
2009
Springer
15 years 1 months ago
Spontaneous and Privacy-friendly Mobile Indoor Routing and Navigation
Abstract: Mobile indoor navigation systems guide users through buildings and premises by taking into account the current position of the user and a destination such as a room, offi...
Peter Ruppel, Florian Gschwandtner
ACSAC
2010
IEEE
14 years 7 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
CHI
2011
ACM
14 years 7 months ago
Family portals: connecting families through a multifamily media space
Video conferencing allows distance-separated family members to interact somewhat akin to being together at the same place and time. Yet most video conferencing systems are designe...
Tejinder K. Judge, Carman Neustaedter, Steve Harri...
CCS
2011
ACM
14 years 4 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...