Sciweavers

6122 search results - page 1068 / 1225
» Securing network access in wireless sensor networks
Sort
View
90
Voted
STORAGESS
2005
ACM
15 years 3 months ago
Hydra: a platform for survivable and secure data storage systems
This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to ...
Lihao Xu
67
Voted
PERCOM
2005
ACM
15 years 9 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
63
Voted
WISA
2004
Springer
15 years 3 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
MOBICOM
2012
ACM
13 years 18 days ago
Locating in fingerprint space: wireless indoor localization with little human intervention
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past decades. Most radio-based solutions require a proce...
Zheng Yang, Chenshu Wu, Yunhao Liu
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 4 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
« Prev « First page 1068 / 1225 Last » Next »