Sciweavers

241 search results - page 19 / 49
» Secure Remote Control of Field-programmable Network Devices
Sort
View
ACISP
2003
Springer
15 years 5 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
AINA
2007
IEEE
15 years 6 months ago
Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services
In recent years a movement from distributed systems controlled by users to automatic, autonomous and self-configuring distributed systems is noticeable. Web services is one approa...
Elmar Zeeb, Andreas Bobek, Hendrik Bohn, Frank Gol...
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 5 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan
MM
2003
ACM
126views Multimedia» more  MM 2003»
15 years 5 months ago
DOVE: drawing over video environment
We demonstrate a multimedia system that integrates pen-based gesture and live video to support collaboration on physical tasks. The system combines network IP cameras, desktop PCs...
Jiazhi Ou, Xilin Chen, Susan R. Fussell, Jie Yang
SUTC
2008
IEEE
15 years 6 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu