Sciweavers

2335 search results - page 354 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 5 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
HICSS
2000
IEEE
169views Biometrics» more  HICSS 2000»
15 years 6 months ago
A Software System for Spatial Data Analysis and Modeling
Advances in geographical information systems (GIS) and supporting data collection technology has resulted in the rapid collection of a huge amount of spatial data. However, known ...
Aleksandar Lazarevic, Tim Fiez, Zoran Obradovic
WSCG
2001
104views more  WSCG 2001»
15 years 3 months ago
Virtual Environment for Cooperative Assistance in Teleoperation
- In order to help the user to accomplish a task, teleoperation systems have to integrate different tools such as visualization, divers interaction devices, planning tools, etc......
Olivier Heguy, Nancy Rodriguez, Hervé Luga,...
CCS
2011
ACM
14 years 1 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...
ICDCSW
2002
IEEE
15 years 6 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...