Sciweavers

434 search results - page 50 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
ESORICS
2010
Springer
13 years 10 months ago
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and...
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
CDC
2010
IEEE
109views Control Systems» more  CDC 2010»
13 years 3 months ago
Reproducing slugging oscillations of a real oil well
This paper addresses the problem of reproducing oscillations generated by the well-known slugging phenomenon in multiphase flow. Reported investigations show how to determine the p...
Florent Di Meglio, Glenn-Ole Kaasa, Nicolas Petit,...
INFOCOM
2007
IEEE
14 years 3 months ago
A Proxy View of Quality of Domain Name Service
— The Domain Name System (DNS) provides a critical service for the Internet – mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard ...
Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-...
NCA
2007
IEEE
14 years 3 months ago
Impact of request dispatching granularity in geographically distributed Web systems
The advent of the mobile Web and the increasing demand for personalized contents arise the need for computationally expensive services, such as dynamic generation and on-thefly a...
Mauro Andreolini, Claudia Canali, Riccardo Lancell...
SP
1989
IEEE
14 years 28 days ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik