Sciweavers

415 search results - page 65 / 83
» A New RFID Privacy Model
Sort
View
AGENTS
2001
Springer
14 years 12 days ago
Wasp nests for self-configurable factories
Agent-based approaches to manufacturing scheduling and control have gained increasing attention in recent years. Such approaches are attractive because they o er increased robustn...
Vincent A. Cicirello, Stephen F. Smith
CSFW
2008
IEEE
14 years 3 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
MOBISYS
2008
ACM
14 years 8 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
POPL
1999
ACM
14 years 1 months ago
JFlow: Practical Mostly-Static Information Flow Control
A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work...
Andrew C. Myers
AINA
2009
IEEE
14 years 3 months ago
Enabling Mobility between Context-Aware Smart Spaces
This paper presents “ConServ1 ”, a web service for context management. ConServ allows smart spaces to access user’s context data according to user-defined policies. This we...
Gearoid Hynes, Vinny Reynolds, Manfred Hauswirth