Sciweavers

651 search results - page 45 / 131
» The Emergence of Standards: A Meta-Analysis
Sort
View
IDTRUST
2010
ACM
15 years 4 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
15 years 4 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee
ICC
2009
IEEE
159views Communications» more  ICC 2009»
15 years 4 months ago
An Enhanced Multiple-Feedback Algorithm for RFID MAC Protocols
Abstract— This paper introduces two new tree-based anticollision schemes using multiple feedback symbols for uplink tag random access of emerging radio frequency identification (...
You-Chang Ko, Sumit Roy, Choong-Ho Cho, Hyong-Woo ...
ICC
2009
IEEE
124views Communications» more  ICC 2009»
15 years 4 months ago
Towards a GNU/Linux IEEE 802.21 Implementation
—Multiaccess mobile devices and overlapping wireless network deployments have emerged as a next generation network fixture. To make the most of all available networks, mobile de...
Esa Piri, Kostas Pentikousis
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 4 months ago
Lightweight Security for Network Coding
Abstract—Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different dat...
João P. Vilela, Luísa Lima, Jo&atild...