Sciweavers

360 search results - page 17 / 72
» The design of integrating subliminal channel with access con...
Sort
View
121
Voted
MM
2004
ACM
145views Multimedia» more  MM 2004»
15 years 6 months ago
Proportional service differentiation in wireless LANs using spacing-based channel occupancy regulation
In this paper, we propose Spacing-based Channel Occupancy Regulation (SCORE) MAC protocol that provides proportional service differentiation in terms of normalized throughput in w...
Qi Xue, Aura Ganz
103
Voted
COMPSEC
2008
116views more  COMPSEC 2008»
15 years 19 days ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
115
Voted
CCS
2009
ACM
15 years 7 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
81
Voted
CAISE
2003
Springer
15 years 5 months ago
Designing Ubiquitous Personalized TV-Anytime Services
In this paper we present the design of an environment that offers personalized, ubiquitous information services in the emerging integrated world of the digital-TV and the Internet....
Fotis G. Kazasis, Nektarios Moumoutzis, Nikos Papp...
SP
2000
IEEE
121views Security Privacy» more  SP 2000»
15 years 5 months ago
A Security Infrastructure for Distributed Java Applications
We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
Dirk Balfanz, Drew Dean, Mike Spreitzer