Sciweavers

2358 search results - page 335 / 472
» A Secure Pervasive Environment
Sort
View
149
Voted
SDMW
2009
Springer
15 years 11 months ago
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance
Abstract. Database provenance chronicles the history of updates and modifications to data, and has received much attention due to its central role in scientific data management. ...
Jing Zhang, Adriane Chapman, Kristen LeFevre
111
Voted
SOUPS
2009
ACM
15 years 11 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
144
Voted
DATE
2008
IEEE
199views Hardware» more  DATE 2008»
15 years 11 months ago
Safe Automatic Flight Back and Landing of Aircraft Flight Reconfiguration Function (FRF)
SOFIA (Safe Automatic Flight Back and Landing of Aircraft) project is a response to the challenge of developing concepts and techniques enabling the safe and automatic return to g...
Juan Alberto Herreria Garcia
151
Voted
HICSS
2008
IEEE
109views Biometrics» more  HICSS 2008»
15 years 11 months ago
Web-Based Service Exchange System for Agents and Humans Alike
Semantic Web research aims at bridging the gap between how humans and agents process information readily available on the Internet. One of the great challenges to this goal lies i...
Evens Jean, Machigar Ongtang, Ali R. Hurson
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 11 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen