Sciweavers

201 search results - page 19 / 41
» Security Threats on EPC Based RFID Systems
Sort
View
PERCOM
2011
ACM
14 years 8 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
ICAPR
2005
Springer
15 years 7 months ago
Millimetre-Wave Personnel Scanners for Automated Weapon Detection
The ATRIUM project aims to the automatic detection of threats hidden under clothes using millimetre-wave imaging. We describe a simulator of realistic millimetre-wave images and a...
Beatriz Grafulla-González, Christopher D. H...
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
15 years 5 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 5 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
ACSAC
2006
IEEE
15 years 7 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg