Sciweavers

5722 search results - page 507 / 1145
» Security Function Interactions
Sort
View
145
Voted
PERCOM
2006
ACM
16 years 4 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
WIKIS
2009
ACM
15 years 11 months ago
Suffr: democratic control of computing infrastructure
Suffr uses Wiki to facilitate corporate governance. Suffr allows a group's members to administer a computer system and its information resources collectively. Categories and ...
Kirk Zurell
112
Voted
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
15 years 11 months ago
Reorganizing Government: Bhutan Visa Online
Centralized government document infrastructure and a policy commitment to transform the tourism sector to a more vivid and efficient business sector works as drivers for implement...
Kim Viborg Andersen, Helle Zinner Henriksen
SOSE
2006
IEEE
15 years 11 months ago
Service Engineering Design Patterns
Design of service-oriented applications differs from design of the component-based applications in granularity, abstraction and dynamic environment in which binding between client...
Nikola Milanovic
141
Voted
ICPADS
2005
IEEE
15 years 10 months ago
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups
In this paper we propose an efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations...
Mark Manulis