Sciweavers

6861 search results - page 142 / 1373
» Security for Ubiquitous Computing
Sort
View
ICICS
2010
Springer
15 years 2 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
149
Voted
EUROCRYPT
2007
Springer
15 years 10 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
ATAL
2009
Springer
15 years 10 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
131
Voted
CCS
2006
ACM
15 years 7 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
149
Voted
IWANN
2007
Springer
15 years 10 months ago
Intelligent Healthcare Managing: An Assistive Technology Approach
This paper is about the key role of Personalization through Ambient Intelligence in the development of Assistive Technologies for the elders. Ambient Intelligence implies three rel...
Ulises Cortés, Cristina Urdiales, Roberta A...