Sciweavers

393 search results - page 66 / 79
» Securing Grid Data Using Mandatory Access Controls
Sort
View
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
14 years 8 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
PERCOM
2006
ACM
15 years 9 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
CMOT
2010
176views more  CMOT 2010»
14 years 7 months ago
A cognitive model of spatial path-planning
Planning a path to a destination, given a number of options and obstacles, is a common task. We suggest a two-component cognitive model that combines retrieval of knowledge about t...
David Reitter, Christian Lebiere
CGF
2004
194views more  CGF 2004»
14 years 9 months ago
Distributed and Collaborative Visualization
Visualization is a powerful tool for analysing data and presenting results in science, engineering and medicine. This paper reviews ways in which it can be used in distributed and...
Ken Brodlie, David A. Duce, Julian R. Gallop, J. P...
CASES
2005
ACM
14 years 11 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...