Sciweavers

443 search results - page 73 / 89
» Secure remote control model for information appliances
Sort
View
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
15 years 5 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel
COOPIS
2002
IEEE
15 years 4 months ago
Composing and Deploying Grid Middleware Web Services Using Model Driven Architecture
Rapid advances in networking, hardware, and middleware technologies are facilitating the development and deployment of complex grid applications, such as large-scale distributed co...
Aniruddha S. Gokhale, Balachandran Natarajan
WPES
2003
ACM
15 years 5 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
CAISE
2010
Springer
15 years 2 days ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
ROBIO
2006
IEEE
120views Robotics» more  ROBIO 2006»
15 years 5 months ago
Event Based Methodology for SuperMedia Enhanced Teleoperation
- SuperMedia provides human operators rich environmental information, thus providing telepresence and enhances efficiency of operation. However, coupling human with the remote envi...
Yang Liu, Amit Goradia, Yonghui Xue, Ning Xi