Sciweavers

18094 search results - page 94 / 3619
» The Architecture of Secure Systems
Sort
View
STORAGESS
2005
ACM
15 years 5 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
WMI
2001
147views more  WMI 2001»
15 years 27 days ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
CSREASAM
2006
15 years 28 days ago
The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services
- In the paper, the generic vulnerability of security software solution is depicted. For selected wireless services such as Device Management, Digital Rights Management and M-Payme...
Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary...
JNW
2008
126views more  JNW 2008»
14 years 11 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
IEEEARES
2010
IEEE
15 years 6 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy