Sciweavers

1373 search results - page 99 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
128
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 6 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
ECOOP
2003
Springer
15 years 6 months ago
Open APIs for Embedded Security
Abstract. Embedded computer control is increasingly common in appliances, vehicles, communication devices, medical instruments, and many other systems. Some embedded computer syste...
Carl A. Gunter
115
Voted
CCS
2009
ACM
15 years 6 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
AOIS
2003
15 years 2 months ago
I-MINDS: An Agent-Oriented Information System for Applications in Education
Abstract. In this paper, we describe an Intelligent Multiagent Infrastructure for Distributed Systems in Education (or I-MINDS) framework that applies an agent-oriented information...
Leen-Kiat Soh, Xuli Liu, XueSong Zhang, Jameela Al...
172
Voted
COMPSAC
2004
IEEE
15 years 5 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...