Sciweavers

5722 search results - page 508 / 1145
» Security Function Interactions
Sort
View
ICDCSW
2003
IEEE
15 years 10 months ago
Controlled Availability of Pervasive Web Services
The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
Peter Robinson, Stefan Hild
ISWC
2003
IEEE
15 years 10 months ago
Peer-to-Peer Policy Management System for Wearable Mobile Devices
Wearable computing devices are obviously made all the more powerful due to their ability to be innately mobile. With this in mind, spontaneous peer-to-peer networks may emerge amo...
Michael Massimi, Ursula Wolz
159
Voted
ACNS
2003
Springer
185views Cryptology» more  ACNS 2003»
15 years 10 months ago
Anonymity-Enhanced Pseudonym System
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonyms. Such schemes are of significant practical relevance because it is the best m...
Yuko Tamura, Atsuko Miyaji
134
Voted
EURODAC
1994
IEEE
124views VHDL» more  EURODAC 1994»
15 years 9 months ago
Automotive databus simulation using VHDL
developed and standardised, for example CAN[1][2], J1850[3]. THE ELECTRONIC VEHICLE TODAYVHDL has been used to develop a simulator for automotive databus networks. This is a design...
Karen Hale
ULPAA
1994
120views Hardware» more  ULPAA 1994»
15 years 6 months ago
EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail
A uniform extension language for email systems can radically extend the utility of electronic mail, simplifying the construction of mail-based services and permitting the delivery...
Nathaniel S. Borenstein